Professional Documents
Culture Documents
PROTECTION USING
TELECOMMUNICATIONS
August 2001
PROTECTION USING TELECOMMUNICATIONS
CIGRE JWG 34/35.11
- Final Report -
Corresponding members:
Ricardo de AZEVEDO DUTRA (Brazil)
Stephen HUGHES (Australia)
David C. SMITH (South Africa)
2 / 172
PROTECTION USING TELECOMMUNICATIONS
CIGRE JWG 34/35.11
Contents
1 FOREWORD, SCOPE, OBJECTIVE ..............................................................................................................7
3 / 172
PROTECTION USING TELECOMMUNICATIONS
CIGRE JWG 34/35.11
4 / 172
PROTECTION USING TELECOMMUNICATIONS
CIGRE JWG 34/35.11
LIST OF TABLES...................................................................................................................................................163
BIBLIOGRAPHY ...................................................................................................................................................164
5 / 172
PROTECTION USING TELECOMMUNICATIONS
CIGRE JWG 34/35.11
ABBREVIATIONS..................................................................................................................................................166
INDEX ......................................................................................................................................................................169
6 / 172
PROTECTION USING TELECOMMUNICATIONS
CIGRE JWG 34/35.11
In September 1996, Cigre SC34 "Power System Protection and Local Control", and SC35
"Power System Communication and Telecontrol", decided to form the joint working group Cigré
JWG 34/35.11, with the following scope of work:
JWG 34/35.11 met for a kick-off meeting in Oslo in September 1997. The working group agreed
that a new version of the former Technical Brochure "Protection systems using
telecommunication" (Ref. No. 13, 1987) should be produced. The document should create
awareness for the requirements, opportunities and risks of protection systems using
telecommunications, and guide protection and telecommunication engineers towards a common
understanding for the design and operation of reliable teleprotection schemes that meet
performance requirements in the most economical way.
Chapter 2 describes power systems from a teleprotection point of view, with focus on power
system faults, their reasons and characteristics, and fault clearing requirements. It continues
with the definition of fault clearing systems, protection systems, protection schemes, and ends
up with explanations why teleprotection is needed, and how protection can use
telecommunication to meet fault clearing requirements.
7 / 172
PROTECTION USING TELECOMMUNICATIONS
CIGRE JWG 34/35.11
fault conditions.
Chapter 7 deals with protection system configuration and design. Compatibility issues between
protection schemes and telecom technologies are addressed to provide a guide for protection
and telecommunication specialists to design teleprotection systems that will meet fault clearing
requirements.
Chapter 8 gives an outlook on future trends and addresses some problems to be solved.
Annexes A1 to A4 contain some related topics and additional information, which the JWG has
found valuable for the better understanding of the subject.
8 / 172
PROTECTION USING TELECOMMUNICATIONS
CIGRE JWG 34/35.11
Power lines designed to transmit electric energy, called transmission lines, are often networked
to improve service capability and reliability. This permits lines to be taken out of service for
planned maintenance, or forced out of service by fault clearing, without disrupting the delivery of
electric energy from the generating source to the customer. Branches of the network are
connected at nodes, called busbars or buses. Power systems are almost always three phase
systems, including conductors for 3 phases and ground wires. Throughout this report only single
line diagrams are shown. Some simple busbar configurations are shown in Figure 2.1-1 and
Figure 2.1-2.
Node in network
= busbar
Breakers
Generator and
transformer unit 1 Overhead
power line
Overhead
Generator and power line
transformer unit 2
Underground
or submarine
cable
Breakers
Nodes at different voltage levels are connected by transformers. These connection points,
transformers and other units are made within a limited geographical area, called a station.
9 / 172
PROTECTION USING TELECOMMUNICATIONS
CIGRE JWG 34/35.11
Configuration of a typical power generating station is shown on Figure 2.1-1, and Figure 2.1-2
shows a typical transformer station.
Node in network
= busbar
Breakers
Power
lines/cables
Transformer 1 Overhead
power line
Overhead
Transformer 2 power line
Load Underground
or submarine
cable
Breakers
Power flows through all healthy transmission lines in the electric power system network as it
moves from generation sources to consuming equipment owned by customers. Electric power
system networks operated by more than one electric power utility are often tied together to form
a large grid that supports the transmission of power over a very large area, sometimes spanning
several countries. Figure 2.1-3 shows the routes of major power lines connected in the
Scandinavian power grid.
10 / 172
PROTECTION USING TELECOMMUNICATIONS
CIGRE JWG 34/35.11
TROMSØ
ALTA
ISLAND
NARVIK
REYKJAVIK
OFOTEN TORNEHAMN
FINNLAND
SVARTISEN PETÄJÄSKOSKI
PIRTTIKOSKI
LETSI
SCHWEDEN
AJAURE
PIKKARALA
TUNNSJØDAL GRUNDF.
LINN-
VASSELV.
VUOLIJOKI
STORFINNF. STORNORRFORS
TRONDHEIM ALAPITKÄ
JÄRP- HJÄLTA ALAJÄR VI
NEA STRÖMMEN
HUUTOKOSKI
NORWEGEN PETÄJÄVESI
KANGAS-
ALA TOIVILA
ULVILA
(132)
OLKILUOT O
HIKIÄ
HYVINKÄÄ
BERGEN LOVIISA
RJUKAN OSLO HELSINKI
INKOO
BORG-
VIK
EN-
KÖPING STOCKHOLM
HASLE
V
STAVANGER
DC
GÖTEBORG DC
NÄSSJÖ
OSKARS-
RING- HAMN
HALS
TJELE HELSING-
BORG
[04/ \ KARLSHAMN
MALMÖ
KøBEN-
KASSØ HAVN / 50 100 150 km
FLENSBURG
HAMBURG
DEUTSCHLAND
11 / 172
PROTECTION USING TELECOMMUNICATIONS
CIGRE JWG 34/35.11
Insulator
Phase - Ground fault
Tower
Ground
Phase - Phase fault
Figure 2.2-1: Power line with examples of fault types and fault positions
All power system components are exposed to faults due to insulation breakdowns. The
Scandinavian power system shown in Figure 2.1-3, for instance, typically experiences
approximately 3000 faults per year.
Voltage stresses caused by lightning and switching transients, and contamination due to
polluted air are major sources of insulation breakdowns. Mechanical stresses caused by wind,
vibration, ice, and snow-loading are major sources of insulator and supporting structure damage
that also leads to insulation breakdown.
For power lines, most insulation breakdowns are in air between phases and/or phases and
ground. Most frequently, insulation breakdowns are along the surface of insulators due to
excessive voltage stresses. An example of insulator flashover is shown in Figure 2.2-2
12 / 172
PROTECTION USING TELECOMMUNICATIONS
CIGRE JWG 34/35.11
Faults on both power lines and other power units can also
be caused by misoperation of earth switches and "forgotten" security ground connections.
Power system faults caused by weather, animals, high trees, humans, or equipment failure
disrupt normal power flow by diverting current through a short-circuited connection and
collapsing power system voltage. In addition to equipment damage, power system faults cause
transients that adversely affect sources of generation and customer loads. Consequently, faults
must be detected and isolated very quickly. Electric power system generators, transformers,
busbars, and power lines are therefore monitored by protective relays designed to detect power
system faults and operate isolating devices designed to interrupt damaging fault current.
13 / 172
PROTECTION USING TELECOMMUNICATIONS
CIGRE JWG 34/35.11
accelerate, motors retard and severe voltage drops can easily result in tripping of complex
industrial plants. For the power system itself, severe disturbances can result in collapses and
blackout for regions, and, in severe cases, even for several countries. Today’s society does not
accept frequent severe disturbances and blackouts because of their heavy reliance on electric
power consuming devices for business activities, safety, lighting, heating, cooking,
communication and many other conveniences.
Therefore, to avoid severe disturbances and blackouts, sound protection practices are used to
provide rapid fault clearing. In some cases, formal requirements for fault clearing are provided to
assure consistent levels of reliability levels throughout the power system. Formal requirements
may be grouped in external requirements and utility requirements as already done in [3].
Utility requirements
The power system must be designed and operated to avoid instability, loss of synchronism,
voltage collapse, undesired load shedding, and unacceptable frequency or voltage. Good
protection practices help meet these objectives by detecting and clearing faults rapidly. Rapid
fault clearing helps:
- Prevent severe power swings or system instability
- Minimize disruption of system power transfer capability
- Prevent unreliable services
- Limit or prevent equipment damage
It is very important to clear the fault within specified ‘limits’ to ensure that the healthy remainder
of the power system can continue to serve it’s customers with acceptable quality and reliability.
Requirements on protection
Protection performance requirements are issued to satisfy external and utility requirements.
These requirements specify how protective schemes must perform on specific contingencies to
fulfill external and utility requirements. They typically provide a balance between the conflicting
goals of dependability and security. Dependability goals require maximum sensitivity and fast
response time to detect and clear all faults quickly with very low probability of a failure to trip.
Security goals require maximum selectivity and slow response time to minimize the probability
of an unwanted trip on an unfaulted circuit. Security is an issue during fault conditions as well as
during normal, unfaulted conditions.
Simply stated, the implementation of these protection requirements should result in dependable
operation of only those relays protecting the faulted unit, and secure non-operation of the relays
during non-fault conditions and when faults occur on adjacent power system units. This balance
is met only through proper protection scheme design, proper relay and equipment selection,
14 / 172
PROTECTION USING TELECOMMUNICATIONS
CIGRE JWG 34/35.11
and proper connection and setting of these relays and equipment to achieve appropriate
sensitivity and coordination.
When protection schemes detect a fault on the equipment or line they protect, they signal
isolating devices, called circuit breakers, to open, isolating the faulty segment of the system,
and restoring normal system voltage and current flow in the power system.
Protection schemes command circuit breakers to isolate faults with no intentional time delay.
When the protection scheme and circuit breakers operate properly, the fault is isolated within
the required fault-clearing time. Protection applied on high voltage systems, where fault-clearing
times are most critical, typically detect faults and operate in about one to two cycles. Some
schemes operate in less than one cycle. Circuit breakers operate in one to three cycles. The
combination of high-speed protection schemes and fast circuit breakers can interrupt a fault in
about two cycles, although more common fault-clearing times range from three to six cycles.
Protection schemes for extremely high voltage transmission lines, however, very seldom meet
all these requirements without using telecommunications. Some protection schemes, such as
stand-alone step-distance schemes, provide very reliable and sensitive protection capable of
clearing all power system faults without using telecommunications, but time response and/or
selectivity requirements can only be met by using telecommunications. Telecommunications are
therefore needed to ensure that time response and selectivity requirements are met for all
power system fault conditions! Telecommunications is also essential for some types of
protection schemes, like analogue comparison schemes, to operate.
If telecommunication fails, backup protection schemes ensure that power system faults will be
cleared, but they may not be cleared within specified performance requirements. Then the
probability of uncontrollable power swings and partial or complete system blackout increases
significantly. Alternative methods for reducing the probability of fault-induced blackouts is to
build additional generating stations and transmission lines, or add redundant
telecommunications. In virtually all cases, it will be far less expensive to add redundant
telecommunications. Telecommunications is therefore vital to the reliability and economy of
modern electric power systems.
Power units and lines are protected in zones to coordinate fault detection and clearing. A
15 / 172
PROTECTION USING TELECOMMUNICATIONS
CIGRE JWG 34/35.11
protection zone is defined as all high voltage power system equipment (and all necessary
control, supervision and protection equipment) between two or more circuit breakers. Selective
fault clearing (selectivity) is to trip the breakers for the faulty zone, and not trip any additional
breakers for non-faulty zones. Five basic zones of protection are shown in Figure 2.4-1. These
zones of protection are identified as Generators (1), Transformers (2), Busses (3), Lines (4),
and Loads, such as Motors (5).
5 5
M M
2 Station C
Station A 3
3 Station B
1
2
G 4 4 1
1 G
2
4 4
G
3 3
Station D
4 4
The boundaries of each zone of protection, as it applies to protective relays, are determined by
the location of the current transformers that provide the representation of primary system
currents to the protective relays. Other parameters, such as voltage, are also used by some
protective relays to perform their protection function, but the current transformer location
determines the protection zone boundary. Overlapping zones of protection is an established
protection concept represented by Figure 2.4-2. As shown, the current transformers are typically
located on opposite sides of the circuit breaker, or on one side and as close as possible to the
circuit breaker that is tripped to clear faults in the respective protection zones.
Protection zone boundaries for power units such as generators, transformers, busses, and
motors are typically within the same substation, permitting one relay to monitor currents at the
boundary of its protection zone. Likewise, the same relay can easily be connected to issue trip
signals to all circuit breakers at the boundary of its protection zone.
The boundary for line protection, however, is typically located at two different stations that may
be separated by a considerable distance. This separation makes it impossible for one relay to
sense currents at both ends of the line, or control breakers at both ends of the line. It is
therefore common practice to install at least one relay and circuit breaker at each end of the
16 / 172
PROTECTION USING TELECOMMUNICATIONS
CIGRE JWG 34/35.11
line. These relays may operate independently, or they may share information to improve their
operating speed, or they may require communication between them to operate.1
CT for Zone B
Zone A Zone B
CT for Zone A
a. CTs on opposite sides of breaker
CT for Zone B
Zone A Zone B
CT for Zone A
b. both CTs on same side of breaker
Figure 2.4-2: Overlapping protection zones established by current transformer location
Fault Clearing System includes one or more protection systems and the circuit breakers
required to clear (interrupt) a fault and isolate the faulted portion of the circuit.
Sensors include voltage transformers and current transformers that scale primary system
voltages and currents down to secondary values compatible with the protective device design.
The Teleprotection Function converts the signals and messages from the protection function
into signals and messages compatible with the telecommunication system, and vice versa. The
teleprotection function may be integrated with the protective device, or the telecommunication
equipment, or it may be in a stand-alone device.
17 / 172
PROTECTION USING TELECOMMUNICATIONS
CIGRE JWG 34/35.11
circuit, permitting the exchange of information (analogue data and/or status) or transmission of
commands. In Figure 2.4-3, the telecommunication system may be dedicated point-to-point,
shared point-to-point, or a network.
Protection System
Auxiliary power
Sensors
Teleprotection
Function Protection
Scheme
Protection
Telecommunication
System
Zone
Teleprotection
Function
Sensors
Circuit Breaker
Protection Mech-
Functions Control anism
Auxiliary power
18 / 172
PROTECTION USING TELECOMMUNICATIONS
CIGRE JWG 34/35.11
Protection functions in one station interchange information with protection functions in a remote
station via teleprotection and telecommunications. This sub-total functionality forms a
Protection Scheme.
Analog comparison protection schemes typically share data, such as line current magnitudes
and phase angles, to differentiate between power system faults within the protected zone or
outside the protected zone. Communication between relays at each line terminal is essential to
the operation of analog comparison protection schemes. State comparison protection schemes
share the logical status of relay elements to determine if the fault is internal or external. These
schemes are generally built by adding and interfacing communication to stand-alone relays to
improve tripping speed for faults in the end-zone areas not protected by direct tripping relays.
Schemes that use communication to improve tripping speed are referred to as communication
assisted schemes.
Telecommunication is also used for intertripping schemes that must communicate a trip
command to a remote substation circuit breaker to isolate a fault within the local station, block
and control schemes, and wide area protection schemes. All of these schemes are described in
greater detail in Chapter 3. Telecommunication systems used for protection are described in
Chapter 4.
Protection using telecommunication provides consistent relay tripping times in the order of 2 to 3
cycles for faults over the entire length of a protected transmission line. Stand-alone protection
schemes may take upwards of 20 to 30 cycles to trip both line terminals of a faulted line.
Protection schemes using telecommunication can thereby reduce the tripping and clearing time
for line faults by as much as 18 to 28 cycles compared with stand-alone protection schemes.
This reduced tripping time greatly reduces the affect of faults on generators, power transfer, and
customer loads, and reduces the damage to faulted and unfaulted equipment. The faster fault
clearing speeds are essential to the efficient and economic operation of modern power systems.
As described in this document, protective relays are interfaced with telecommunication systems
through the teleprotection function. The teleprotection function may be performed by a stand-
alone device, or it may be integrated with the protective relay or with the telecommunication
equipment. Interfaces between protection relays, teleprotection, and telecommunication
systems are described in Chapter 5.
The following chart is excerpted from the IEC 60834-1 standard to help show the relationship
between protection, teleprotection, and telecommunication.
From the teleprotection point of view, the relatively selective protection schemes shown in
Figure 2.5-1 are typically communication-aided state comparison schemes (see 3.1.2), and the
absolutely selective protection schemes in Figure 2.5-1 are typically communication dependent
analog comparison-schemes (see 3.1.1.).
19 / 172
PROTECTION USING TELECOMMUNICATIONS
CIGRE JWG 34/35.11
20 / 172
PROTECTION USING TELECOMMUNICATIONS
CIGRE JWG 34/35.11
These systems are called analogue comparison protection systems because they exchange
analogue quantities such as amplitude and/or phase with the other ends. They are sometimes
also referred to as "unit protection" or "closed" schemes. The term “unit” refers to the clear
interdependence between the ends for operation and to the closed and absolutely selective
characteristic of this protection.
Obviously, the comparison must be made between magnitudes at the same instant, which
implies a transmission and comparison system as fast as possible. A delay must be provided for
the local signal to compensate for the transmission time of the remote value.
Unlike the time-grade protection such as distance and time overcurrent relays, the trip of the
analog comparison protection is instantaneous for every fault on the protected line.
It is applicable to any overhead line or cable at all voltage levels and for any type of system
neutral arrangement. It is particularly suitable where:
- Step distance relays (without acceleration schemes) have limitations, for example:
à Very short lines and cables due to their low impedance, which makes it difficult to
find an adequate setting to get a instantaneous trip for faults on the main part of the
line.
à Multi-terminal lines, since the intermediate infeeds modify the impedance seen by
the distance relays, which depends not only on the distance to the fault, but also on
the infeed from the remote terminals, making impossible an accurate measure of the
impedance.
- No potential transformers and only current transformers are installed at each end of the
line.
We can distinguish two types analog comparison protection systems: longitudinal current
differential protection and phase comparison protection. The current differential protection
compares the power frequency signals proportional to the primary power system currents
(amplitude and phase angle), while the phase comparison one is based on comparison of the
phase angle (or sign) between currents of each end of the protected line.
Since both of them use only current information, in comparison with the distance or other
system protections, analog comparison protections have the following advantages:
21 / 172
PROTECTION USING TELECOMMUNICATIONS
CIGRE JWG 34/35.11
- No mutual coupling problems from parallel lines. This may cause the line-to-ground fault
current reverses and flows into a weak source terminal, causing faulty directional
discrimination if other protection systems are used
- Not subject to transient problems associated with coupling capacitor potential devices
- With segregated current differential there are no problems of phase selection for single
pole auto-reclosing at simultaneous faults on different circuits and phases close to one
line end, because it operates only for faults between current transformers in each phase.
- Some relaying problems in EHV transmission lines due to applying series capacitors are
also overcome, e.g. voltage reversal, current inversion or phase imbalance.
When phase selection is required for single phase tripping, especially at simultaneous faults on
different circuits and phases or in a faulty line when handling heavily loaded EHV lines, the
phase-segregated technique is used. The analogue information is transmitted separately for
each phase.
In cases where the complete information about the polyphase conditions is not essential and
single-phase tripping is not needed, the non-segregated technique is used. It reduces the three-
phase system of currents to a single-phase one by means of a mixing device. The
communication link needs therefore to only accommodate the transmission of this single phase
information. Some mixing techniques are described in [1].
Operating principles
As mentioned above the current differential protection is an absolutely selective protection
system for transmission lines, tripping instantaneously for faults in the protected zone defined by
the current transformers of each end of the line.
It is based in the principle of current comparison. The Figure 3.1-1 shows a basic scheme of the
differential protection. In each terminal, an evaluation circuit compares the sum of the local and
remote current values, i.e. the differential current, with an operation threshold value Iop. In
normal operation conditions or external faults, the current entering at one end is practically the
same as one leaving at the other end, so the differential current value is practically zero and the
protection will remain stable. For a fault on the protected power line the differential current value
will exceed the operation value and the protection will trip.
When very large currents flow through the protected zone for a fault external to the zone a
differential current appears due to the different ratio error and saturation characteristic of the
current transformers, which could exceed the operation level. Such a maloperation of the
protection is prevented by the stabilizing. The stabilizing characteristic uses a bias current,
which is usually proportional to the sum of the absolute values of the currents at each terminal,
i.e. |iA| + |iB|, in order to make the protection less sensitive for higher through currents. This
technique is also called percentage restraint.
22 / 172
PROTECTION USING TELECOMMUNICATIONS
CIGRE JWG 34/35.11
A IA IB
B
SA TX Telecommunication TX SA
system
iA iB
DEL DEL
iB iA
+ RX RX +
Id Id
TPF TPF
Id> Iop Id>Iop
Figure 3.1-2 shows an example of percentage restraint characteristic with two slopes: the lower
slope ensures good sensitivity to resistive faults under heavy load conditions, while the higher
slope is used to improve relay stability against saturation of the current transformers and other
distortion effects under heavy through fault conditions.
The selection of the minimal operation current Is1 is based upon the magnitude of line
capacitance current and switching transients expected on the protected line. The capacitance of
the three conductors to earth and, except in single core cable, also between each other, makes
that under undisturbed conditions the current at both ends differs in angle and magnitude.
Particularly in cables, the capacitive charging current can attain significant values. Nevertheless,
usually the necessary rise of the Is1 does not involve an important loss of sensitivity.
Idiff
TRIP
slope k2
Is1 slope k1
Is2
Ibias
Idiff = iA + iB
23 / 172
PROTECTION USING TELECOMMUNICATIONS
CIGRE JWG 34/35.11
The differential principle may be applied to multi-terminal lines. The protection relies on the sum
of the inflowing currents, which are added geometrically. For this purpose, the measuring
circuits have to be so arranged that at each end of the line, the local current and the currents
from each of the others ends of the line are available for comparison. Generally, the most recent
designs allow up to three terminals applications.
For a multi-terminal system, the master/slave or centralized configuration is also used. In this
case, the current values are sent to a specific terminal for evaluation of the differential current.
This terminal will henceforth be noted as a master, while the terminal sending information about
currents will be denoted as a slave terminal. For a two-terminal system, the master/slave
configuration can, of course, also be used, but a master/master or distributed configuration,
where the current information is exchanged between both terminals and evaluated at both ends
is normally preferred, since this gives a shorter operating time than that in a master/slave
configuration. See Figure 3.1-4 and Figure 3.1-5 for more details about centralized and
distributed configurations.
The saturation of the current transformers for heavy through currents normally requires the
selection of a higher slope setting which involves a loss of sensitivity for internal faults. Recent
protections include some techniques to detect the saturation, so in only such conditions is the
protection desensitized increasing the restraint slope. To avoid the maloperation of the remote
protections, the terminal that detects the saturation includes a code in the message transmitted
to the other ends, so that all terminals increase the degree of stabilization.
Additional functions
Generally, differential protections use intertrip functions, i.e. the sending of trip commands to the
remote ends. Intertrip commands are sent through the same communication channels used to
transmit the current values (switching the channel frequency to a specific intertrip frequency
when analogue links are used, or flagging the corresponding command bits in the out-going
data messages in digital links).
The intertrip function is activated either when the relay reaches a trip decision, or by closing an
external contact connected to an input of the relay.
24 / 172
PROTECTION USING TELECOMMUNICATIONS
CIGRE JWG 34/35.11
ST
Pilot wires
MCT
MCT
TR TR
ST
Figure 3.1-3: Basic scheme of a current balanced system using three pilot wires
In this case, the three-phase system is converted into a single AC current in the mixing
transformer MCT (non-segregated).
One differential system for each power phase (segregated) of the protected circuit can also be
provided. If high resistance faults are expected or faults on which the value of earth fault current
is relatively low, a fourth measuring system for the zero sequence component can be
introduced. This however, increases the number of pilot wires and therefore the communication
cost of the comparison information.
In both methods, a replica of the vector difference is formed at each line end by means of a
transformer ST for the stabilizing effect and a replica of the vector sum of the currents flowing at
each end by means of a further transformer TR for the tripping effect. These values are
evaluated separately at each line end in a measuring module and a tripping command is issued
to the circuit-breaker when the fault current has exceeded a permanently adjusted threshold
value.
Where the voltage induced into the pilot cables during earth faults may exceed the rated values,
the protective relays should be isolated from the pilot wires by isolating transformers, which can
also be used to subdivide the total length of the pilot wires into two or three sections. This
prevents the equipment from being subjected to excessive longitudinal voltage due to
25 / 172
PROTECTION USING TELECOMMUNICATIONS
CIGRE JWG 34/35.11
The application of differential protection using pilot wires is restricted on lines up to 10-25 km
depending upon the scheme used. So for longer lines, modulation techniques over other
transmission media should be used. More details about differential protection using pilot wires
and their limitations can be found in [1] and in chapter 4.3.1.
Multi-terminal configuration
Transmission line protection based on a current differential scheme detects zone faults by using
each terminal current and transmits the detection results of the zone fault to the other terminals.
There are two types of multi-terminal current differential protection configurations; centralized
and distributed configurations. As these configurations are applied to a single zone protection,
they may be also applied to multi-zone and wide-area protections.
1
Note on pilot-wire replacement:
The corrosion problems of buried copper wires, with the trend of telcos to replace copper-pair cables with fibre communication
links, have put pressure on utilities to consider alternate means of connecting their extensive infrastructure of pilot-wire relays; this
has created a market for specialized interface units which emulate these copper wires.
The accuracy requirements of such interfaces depend on the accuracy requirements of the relay settings, the main parameters of
concern are:
- The interfaces’ dynamic range. This should not limit on fault currents, whilst providing the required signal integrity during low
line-current conditions.
- The end-to-end propagation delay. Since a 10% fault current error would be caused by the 5 degrees phase error accruing
from 230µs on a 60Hz grid (280µs on a 50Hz grid), this delay is critical (this teleprotection application has the most stringent
delay requirements of all teleprotection applications).
- In practice, up to 1ms may be manageable for the protection of 2-ended lines, but 500us or less may be required for 3-ended
lines.
26 / 172
PROTECTION USING TELECOMMUNICATIONS
CIGRE JWG 34/35.11
Centralized configuration
Figure 3.1-4 shows an example of line protection for a five-terminal EHV line [7]. Each terminal
has a terminal unit that detects the current and transmits the data to the main unit terminal via a
communication channel. This configuration simplifies the unit of each terminal and
communication channel. Since the main unit has current data of all terminals, the fault locator
function can be easily implemented by using these data.
Distributed configuration
Figure 3.1-5 shows a distributed configuration of five-terminal current differential line protection
system. Each terminal has the current differential protection function as well as the signal
transmitting function that multiplexes current data at each terminal into one communication
signal. Master station A sends its own current data to slave station B. Slave stations B, C, D and
E multiplex their own current data over communication signal. Slave station E turns back this
signal toward slave station D. Now current data of all terminals are on the communication bus
and available for protection. In addition, this system contains sampling synchronization function
which enables the simultaneous sampling of current data at each terminal with high accuracy.
Many installations were conducted using a 1.544-Mbit/s fiber-optic communications channel for
HV double-circuit multi-terminal (up to ten terminals) or tapped lines [8]. In this network
configuration where current differential calculation is usually carried out at each terminal, a
centralized scheme where only master station conducts the calculation and sends the transfer
trip signal to all slave stations is also available.
27 / 172
PROTECTION USING TELECOMMUNICATIONS
CIGRE JWG 34/35.11
Operating principles
Phase comparison protection is based on the comparison of the phase angle between currents
of each end of the protected power line. Under normal load conditions or in case of an external
fault, the angle measured between the local current and the current at the remote ends will be
small. If the angle is large, it is due to an internal fault.
The basic principle of all phase comparison systems is to measure the angle as above
mentioned. However, the method of doing so can differ from manufacturer to manufacturer. A
phase comparison system can be characterised by the following features:
- Comparison is made for each phase separately. A zero sequence circuit may also be
included => Segregated protection.
- The currents of the three phases are mixed into one quantity for comparison => Non-
segregated protection.
- The measurement is made twice every period => Full-wave phase comparison.
- The measurement is made once every period => Half-wave phase comparison.
- The phase angle signal is transmitted to the remote end only when a starter has picked
up.
- Measuring is carried out continuously and the signals are permanently transmitted.
- A phase comparison scheme can be designed for a blocking mode or for an unblocking
mode of operation, similar to a distance protection system using telecommunication.
The current which is used in the comparison is converted into a square wave signal, so that the
positive portion corresponds to the positive half-cycle and the zero portion corresponds to the
negative half cycle. The square wave from the remote terminal is compared with the local
square wave as shown in Figure 3.1-6.
A IA IB B
SA SQ TX Telecommunication TX SQ SA
system
DEL
iA iB DEL
∆ϕ>θ & & ∆ϕ>θ
RX RX
iB iA
TPF TPF
28 / 172
PROTECTION USING TELECOMMUNICATIONS
CIGRE JWG 34/35.11
IA IA
IB IB
iA iA
iB iB
iA & iB iA & iB
∆ϕ<θ ∆ϕ>θ
In normal line conditions, there is a (small) phase current difference between line ends due to:
- The capacitance of the power line
- Errors due to the equipment, e.g. current transformers, sequencer, filters, squarer, etc.
- The time delay due to the signal propagation time between the terminals
To prevent false trips, a critical angle is defined, commonly called stabilizing angle, which limits
the maximum phase difference between currents, which would correspond to a boundary
between tripping and stabilizing.
In a non-segregated phase comparison protection, the three currents are mixed into one
quantity by means of a composite sequence network. The half-wave system use starters,
normally based on overcurrent detectors, to determine whether a fault has occurred, to initiate
signal transmission to the remote end and to permit local tripping. In the full-wave system, the
comparison is made for each semi-period and normally is therefore faster than the half-wave
type. Phase comparison information is transmitted all the time to the remote equipment, and no
starter is required.
The comparison in the segregated protection system is similar to the non-segregated protection
but, the comparison is made separately for each phase. It is very suitable for single pole
reclosing when handling heavily loaded EHV lines and parallel circuits on the same towers.
Segregated protection is more sensitive for earth faults than non-segregated protection, but it is
more costly and the requirements on communication are higher.
More details about non-segregated and segregated techniques can be found in [1].
29 / 172
PROTECTION USING TELECOMMUNICATIONS
CIGRE JWG 34/35.11
Some recent designs use dynamic principles based on the variation of the instantaneous
current values in for example two periods, i.e. ∆i = i(t) - i(t-2T), so that the signal to compare is
the sign of this variation value ∆i. This principle, normally operating in combination with a
conventional phase comparison with starter, gives a higher sensitivity for high resistance ground
faults.
Additional functions
A number of complementary functions may be included in the protection relay. Intertrip functions
are used to trip the remote breakers by means of sending a command through the same
communication channel used for comparison signals. An overcurrent criterion normally
supervises the remote trip to prevent tripping under normal conditions.
The same additional functions mentioned for current differential protection are also applicable
for phase comparison protection.
Non-phase-segregated technique
In a half-wave comparison scheme it is very common to use power line carrier as
communication medium, with the same carrier frequency used for both directions. The carrier is
amplitude modulated i.e. switched “on” during positive half-cycles, and “off” during negative half-
cycles, or vice-versa. This system operates as a blocking scheme. For an internal fault, if the
blocking signal from the other end is not received, the output of the comparator circuit sends a
trip command when the starters have picked up. This system might behave incorrectly in some
situations due to the noise generated during a fault, i.e. blocking the operation for internal faults
(=> delayed tripping) or deblocking for external faults (=> unwanted tripping).
In a full-wave comparison different frequencies for the two directions must be used. A FSK
(frequency shift keying) signal is used, which can be transferred over pilot wires, power line,
radio or fibre-optic link. The communication equipment continuously monitors itself and when a
fault occurs, the local signal is compared with the remote for both positive and negative half-
cycle in the protection relay.
Phase-segregated technique
In this case, the values of each phase are transmitted separately via independent channels.
Most recent phase comparison systems usually operate in segregated mode and use digital
communication systems. The square signals to compare are sampled and converted to digital
data, which are transmitted serially to the opposite terminal by the telecommunication system.
Data rates and electrical or optic interfaces are the same as those mentioned for differential
protection.
When starters are used to initiate the comparison, a sequence of “guard” bits is transmitted in
30 / 172
PROTECTION USING TELECOMMUNICATIONS
CIGRE JWG 34/35.11
normal state of operation, in order to monitor the channel availability and performance by the
receiver.
Some designs optionally include a modem to interconnect two terminals through a 4-wire audio
channel. In this case, a data rate of 9'600 or 19'200 bit/s may be used.
To perform charge comparison, the waveform of each line terminal’s phase and residual current
is sampled every ½ millisecond. The half-cycle area under each wave is measured by
integrating current samples between zero-crossings. For each phase and ground, the resulting
ampere-second area (i.e., coulombs of charge) is stored in local memory, along with polarity
and start/finish time-tags. This storage operation occurs only if the magnitude exceeds 0.5
ampere r.m.s. equivalent and the half-cycle pulse width is equal to 6 ms or more.1
Every positive (negative 3Io) magnitude is also transmitted to the remote terminal, along with
phase identification and some timing information related to pulse width and queuing time (if any)
at the transmitting terminal. When the message is received at the remote terminal, it is
immediately assigned a received time-tag. A time interval is then subtracted from the received
time-tag. This interval represents the channel delay compensation (which does not have to be
precisely equal to the actual channel delay time) and the timing information contained in the
received message. The adjusted received time-tag (after subtraction) is then compared with the
local start and finish time-tags, looking for a “nest”, per Figure 3.1-7 (shown for an external
fault).
Time adjusted in
received message Channel delay
compensation
Time interval
subtracted
Local current
1
Magnitude is actually measured in terms of ampere-seconds (i.e., coulombs). However, all values are converted to amperes rms
equivalent, based on a perfect 60 Hz (or 50 Hz) sine wave, without offset.
31 / 172
PROTECTION USING TELECOMMUNICATIONS
CIGRE JWG 34/35.11
A nest is achieved when the adjusted received time-tag is greater than the local start time-tag
and smaller than the local finish time-tag, for a given half-cycle stored in memory.
When the nesting operation is successful, the local and remote current magnitudes (actually
charges converted to equivalent currents) are then added to create the scalar sum (sum of
absolute magnitudes). The scalar sum becomes the effective restraint quantity and the
arithmetic sum becomes the effective operate quantity, per the bias characteristic shown in
Figure 3.1-8.
BIAS LEVEL
(TRIP)
ARITHMETIC
SUM
(RESTRAINT)
SCALAR SUM
The bias level is an operate threshold which provides security in the presence of spurious
operate current due to line charging current, current transformer mismatch, analog-to-digital
conversion quantizing errors, etc. As shown in Figure 3.1-8, the bias level rises sharply after the
scalar sum reaches a high value. This provides security for unequal CT saturation during high
current external faults. At lower currents, the bias level has a slight upward slope. This takes
care of the relatively minor non-communications-related errors that increase with current level,
such as CT ratio errors.
The operating characteristic of charge comparison, when plotted on a polar diagram, is the
“ideal” rainbow-shape of Figure 3.1-9. Referring to Figure 3.1-7, if the adjusted received time-
tag nests with a local negative half-cycle, this is equivalent to the upper half of Figure 3.1-9. If
the adjusted received time-tag nests with a local positive half-cycle, then the arithmetic sum and
scalar sum are equal to each other, which describes a 45 degree line on the bias characteristic
(well above the bias threshold for all except very small values of current). This is equivalent to
the lower half of Figure 3.1-9.
IL IR
RESTRAINT
Protected
REGION OF IR
line
IL
32 / 172
PROTECTION USING TELECOMMUNICATIONS
CIGRE JWG 34/35.11
The bias level of charge comparison is significantly more sensitive than that of conventional
current differential relays for line protection. The conventional relay requires a gradually
increasing bias to take care of increasing spurious operate current for a given assumed error in
channel delay compensation (the biggest single source of spurious operate current). In contrast,
charge comparison introduces no additional communications-related error as the currents get
bigger, for a given error in channel delay compensation. Furthermore, for a given magnitude of
through current, no operate error current is introduced, at all, for increasing channel delay
compensation error (up to + 4 ms, at which point a total relay misoperation occurs – typical of a
digital system). The + 4 ms misoperation threshold for charge comparison is almost three times
the + 1.5 ms (approximately + 30 degrees on 60 Hz systems) misoperation threshold which is
typical of conventional current differential schemes with circular polar diagram characteristics.
Lit: [38]
Overall, the communication requirements for state comparison protection schemes are
considerably less stringent than for analog comparison protection schemes. Communication
speed, or minimum delay, is always of utmost importance because the purpose for using
communication is to improve the tripping speed of the scheme. Also, variations in
communication speed are better tolerated in state comparison schemes than in the analog
comparison protection schemes discussed in an earlier section. Communication channel
security is essential to avoid false signals that could cause incorrect tripping, and
communication channel dependability is important to ensure that the proper signals are
communicated during power system faults, the most critical time during which the protection
schemes must perform their tasks flawlessly.
Comparing the direction to the fault at one terminal with the direction to the fault at the other
terminal permits each relay scheme to determine if the fault is within the protected line section,
requiring the scheme to trip, or external to the protected line section, requiring the scheme to
block tripping. Directional distance and/or directional overcurrent relays are typically used at
each line terminal to determine the fault direction. The relays used at each line terminal operate
independent of the relays at other line terminals; some may even be set to provide time delayed
tripping for faults outside the protected line section, hence the term “non-unit” protection, or
“open system” protection is sometimes given to these types of schemes.
If it were possible to set relays to see all faults on their protected line section, and to ignore
faults outside of their protected line section, then there would be no need for communication
schemes to assist the relays. However, distance and directional overcurrent relays cannot be
set to “see” faults within a precise electrical distance from their line terminal. They are imprecise
because of many factors, including voltage and current transformer errors, relay operating
tolerance, line impedance measurement errors and calculation tolerance, and source
33 / 172
PROTECTION USING TELECOMMUNICATIONS
CIGRE JWG 34/35.11
impedance variations. The primary relay elements used to detect line faults are therefore set to
see or reach either short of the remote line terminal (this is called under reaching), or to see or
reach past the remote line terminal (this is called over reaching).
Communication for state comparison protection schemes must therefore be designed to provide
safe, reliable, secure, and fast information transfer from one relay scheme to another. The
communication scheme must also be able to transmit information in both directions at the same
time. The amount of information required to transfer between relay schemes depends on the
relay scheme logic. The basic and most common state comparison protection schemes are
described in the following subsections. Their communication requirements are discussed within
these subsections. The order in which they are presented does not imply their priority, relative
importance, or usage. Other schemes and combinations of schemes may be designed to meet
specific protection needs, however, they are typically all based on the basic schemes described
in this document.
The terminology used to describe these state comparison protection schemes may differ from
utility to utility and country to country. State comparison schemes are basically defined
according to the impedance zone which sends the protection signal to the remote end of the
line. The following Table 3.1-1 shows the preferred CIGRE scheme names and alternate
scheme names used elsewhere. CIGRE scheme names will be used throughout this document.
CIGRE State Comparison Protection Scheme Alternate State Comparison Protection Scheme
Name Name
Intertripping underreach distance protection Direct underreach transfer tripping
34 / 172
PROTECTION USING TELECOMMUNICATIONS
CIGRE JWG 34/35.11
gap between the protection zones where faults would not be detected.
RU
RU
Bkr 1 Bkr 2
Protected Line
Teleprotection
Equipment
RU TX TX RU
RX RX
Protection
Equipment
For internal faults within the overlap zone, the underreaching functions at each end of the line
operate and trip their associated line breaker directly. At the same time, the RU function keys
its respective transmitter to send a direct transfer trip signal to the relay scheme at the remote
line terminal. Receipt of the trip signal from the remote line terminal also initiates line breaker
tripping.
This scheme provides high speed tripping at both line terminals for all faults within the protected
line section under most conditions. However, it will not provide tripping for faults beyond the
reach of one of the RU functions if the remote breaker is open or if the remote channel is
inoperative. If only one communications channel is used at each terminal, security may be
jeopardized because any erroneous output from the channel initiates an instantaneous breaker
trip. For this reason, this scheme is often applied with dual channels where both outputs must
provide a TRIP signal to initiate a breaker trip. Or a slight delay may be added to a single
channel output to ensure that the remote trip signal is valid before tripping the breaker.
Time-delayed overreaching back-up tripping functions that do not interface with the
communication scheme are usually added to trip the associated line breaker for faults beyond
the reach of the RU functions when the remote breaker is open, or when the communication
channel is inoperative.
This scheme may use virtually any communication media that is not adversely affected by
electrical interference from fault generated noise or by electrical phenomena, such as lightning,
that cause faults. Communication media that use a metallic path are particularly subject to this
type of interference, and must, therefore, be properly shielded, or otherwise designed to provide
an adequate communication signal during power system faults.
35 / 172
PROTECTION USING TELECOMMUNICATIONS
CIGRE JWG 34/35.11
RO
RU
RU
RO
Bkr 1 Bkr 2
Protected Line
Teleprotection Equipment
Duplex Communication Link
RU TX TX RU
RX RX RO
RO
Protection Equipment
When the underreaching relay elements detect a fault, they trip the local breaker directly and
key a TRIP signal to the remote line terminal. Unlike the Intertripping Underreach Distance
Protection Scheme, the Permissive Underreach Distance Protection Scheme supervises the
received trip signal with an overreaching relay element. Communication assisted tripping occurs
only if the overreaching relay element detects a fault during the time that a trip signal is received
from the remote line terminal via the communication channel.
Because the received communication signal is supervised by the output from an overreaching
relay element, there is less concern about a false signal causing an incorrect trip. This scheme
is therefore typically applied with a single duplex communication channel. This scheme may use
virtually any communication media that is not adversely affected by electrical interference from
36 / 172
PROTECTION USING TELECOMMUNICATIONS
CIGRE JWG 34/35.11
fault generated noise or by electrical phenomena, such as lightning, that cause faults.
Communication media that use a metallic path are particularly subject to this type of
interference, and must, therefore, be properly shielded, or otherwise designed to provide an
adequate communication signal during power system faults.
The overreaching (RO) relay elements often start a zone 2 timer to provide time delayed tripping
for faults outside the reach of the underreaching (RU) relays elements if the communication
channel is inoperative.
RO
Bkr 1 Bkr 2
Protected Line
Teleprotection Equipment
Duplex Communication Link
RO TX TX RO
RX RX
Protection Equipment
RO - overreaching trip function, must be set to reach beyond remote end teminal
For a fault anywhere on the protected line, both of the RO functions operate and assert one of
the inputs to the logic AND (&) gate. At the same time, RO also keys the transmitter TRIP
signal. Receipt of the TRIP signal at each terminal, and an output from the RO function,
satisfies the logic AND (&) gate to produce a TRIP output to the breaker. For external faults, the
RO functions at only one end of the line will operate, so communication assisted breaker
tripping is not initiated at either terminal.
The scheme is very secure in that it does not trip for any external fault if the channel is
inoperative. Conversely, the scheme is lacking in dependability because it will not trip for any
internal faults if the channel is inoperative. The scheme also will not trip for any fault if the fault
is not detected at all terminals of the line. The scheme may not trip at high speed for close-in
37 / 172
PROTECTION USING TELECOMMUNICATIONS
CIGRE JWG 34/35.11
faults at the strong terminals because the fastest tripping time that can be expected is
dependent on the slowest function to operate for an internal fault. Some means must be used
to key the transmitter at an open breaker if tripping is to be initiated for faults seen at the other
terminals. Breaker auxiliary contact switch keying with echo logic is commonly used to provide
this requirement. Time-delayed back-up tripping can be provided because the scheme uses
overreaching functions. Because the GUARD signal is transmitted continuously, the channel
can be monitored on a continuous basis.
This scheme may use virtually any communication media that is not adversely affected by
electrical interference from fault generated noise or by electrical phenomena, such as lightning,
that cause faults. Communication media that use a metallic path are particularly subject to this
type of interference, and must, therefore, be properly shielded, or otherwise designed to provide
an adequate communication signal during power system faults.
Extended RU RU
RU Extended RU
Bkr 1 Bkr 2
Protected Line
Teleprotection Equipment
Duplex Communication Link
RU TX TX RU
RX RX
Extend RU Extend RU
TRIP Bkr 1 TRIP Bkr 2
Protection Equipment
For an internal fault within the overlap zone of the RU functions, breaker tripping is initiated
directly at both line terminals and each communication channel is keyed to the TRIP signal.
Receipt of the TRIP signal extends (accelerates) the reach of the RU functions to beyond the
remote line terminal. This reach extension has no further affect because breaker tripping has
38 / 172
PROTECTION USING TELECOMMUNICATIONS
CIGRE JWG 34/35.11
already occurred at each line terminal. For an internal fault near one terminal, the RU function
at that terminal operates, tripping the breaker and keying its transmitter to the TRIP signal.
Receipt of the TRIP signal at the other terminal extends the reach of that terminal’s RU function,
which then detects the fault to initiate tripping. For external faults, none of the RU functions
operate, therefore tripping does not occur at either line terminal.
The scheme is more secure than the Direct Underreach Distance Protection scheme because it
does not trip directly on receipt of a trip signal. Conversely, it is slower than the Permissive
Underreach and Overreach Distance Protection schemes because it must wait for the extended
RU function to detect the fault before tripping. As mentioned before, it also requires a special
relay with zone extension capability.
This scheme may use virtually any communication media that is not adversely affected by
electrical interference from fault generated noise or by electrical phenomena, such as lightning,
that cause faults. Communication media that use a metallic path are particularly subject to this
type of interference, and must, therefore, be properly shielded, or otherwise designed to provide
an adequate communication signal during power system faults.
The overreaching tripping functions (RO) must be set to reach beyond the remote terminal of
the transmission line with margin so they will be able to detect a fault anywhere on the
transmission line. The blocking functions (B) are used to detect any fault not on the protected
line that the remote tripping functions are capable of detecting; so they must be set to reach
further behind the terminal than the tripping function at the remote terminal.
For a fault external to the protected line, one or more of the blocking functions operate to key its
respective transmitter to send a blocking signal to the remote terminal. Receipt of the blocking
signal blocks tripping in the event one of the tripping functions has operated for the remote fault.
The coordinating timer, TL1, is required to allow time for a blocking signal to be received from
the remote terminal. It is set to compensate for channel time, signal propagation time and for
any difference in operating time that might result if the remote blocking function is slower than
the local tripping function.
For a fault anywhere on the transmission line, one or more of the tripping functions (RO) at each
terminal will operate and apply an input to its respective AND gate (&). The blocking functions
will not operate for an internal fault, therefore neither transmitter is keyed, so that there is no
output from either receiver. The logic at each terminal produces an output that starts the TL1
timer. When the TL1 timer expires, the scheme produces an output to trip the breaker.
39 / 172
PROTECTION USING TELECOMMUNICATIONS
CIGRE JWG 34/35.11
RO
RO
Bkr 1 Bkr 2
Protected Line
Teleprotection Equipment
B TX TX B
RO RX Simplex or Duplex RX RO
Communication Link
TL1 TL1
C & TRIP Bkr 1 TRIP Bkr 2 & C
0.0 0.0
Protection Equipment
RO - overreaching trip function, must be set to reach beyond remote end of line
B - blocking function, must be set to reach beyond overreaching trip function at remote end of line
C - Coordinating time, required to allow time for blocking signal to be received
(set equal to channel time plus propogation time plus margin)
The scheme is very dependable because it will operate for faults anywhere on the protected line
even if the communication channel is out of service. Conversely, it is less secure than
permissive schemes because it will trip for external faults within reach of the tripping functions
(RO) if the channel is out of service. This scheme does not require breaker auxiliary contact or
echo logic keying when the remote breaker is open to permit tripping for faults anywhere on the
line. It provides relatively fast tripping (dependent on coordinating time delay) for most source
and line conditions. However, it may not trip weak terminals of the transmission line, if fault
levels are below the sensitivity of the tripping relays.
If quiescent (OFF/ON) communication channels are used there is no way to monitor the channel
continuously because the channel is only keyed on during external faults. A communication
channel check-back scheme is often used to periodically key a momentary block signal to check
the channel status. Some check-back schemes echo a signal back to verify that the channel is
operational in both directions. Other schemes must receive a signal within a preset time period
to declare the channel in service.
The overreaching functions can be used to drive timers so that time-delayed back-up tripping
can be provided for faults within reach of the overreaching functions.
40 / 172
PROTECTION USING TELECOMMUNICATIONS
CIGRE JWG 34/35.11
signal may be attenuated by the fault, especially when the fault is close to a line terminal,
thereby disabling the communication channel. Multi-phase power line carrier coupling schemes
can be used to minimize this problem.
The Deblocking Overreach Distance Protection scheme includes logic specifically designed to
accommodate a loss of communication signal during the protected line fault. The Deblocking
Overreach Distance Protection scheme, like the Permissive Overreach Distance Protection
scheme, uses overreaching phase distance functions almost exclusively for multi-phase fault
detection, and ground distance or directional ground overcurrent functions for ground fault
detection. The logic requires the use of an active communication channel that transmits a
GUARD signal during quiescent, or unfaulted, conditions, and is keyed to a TRIP signal when
the associated overreaching relay element detects a fault within its reach. To overcome the loss
of signal caused by the internal line fault, deblocking logic permits a TRIP output if the loss of
signal occurs at nearly the same time the overreaching relay function(s) detect a fault. A
tripping period is controlled by a timer that is typically set between 150 and 300 milliseconds.
Basic logic for the Deblocking Overreach Distance Protection scheme is shown in Figure 3.1-15.
RO
RO
Bkr 1 Bkr 2
Protected Line
GUARD Frequency Shift Power Line GUARD
OR Carrier Communication Link OR
TRIP TRIP
} {
RO TX TX RO
RX RX
RO - overreaching trip function, must be set to reach beyond remote end teminal
LOG - Loss of GUARD detection from receiver, RX
T - deblocking time delay, typically set for 150 to 300 milliseconds.
If the signal loss is due to a fault on the protected line, at least one of the overreaching trip
functions (RO) will be picked up. Thus, tripping will be initiated when the deblocking output is
produced. If none of the permissive trip functions are picked up, the channel will lock itself out
150 - 300 milliseconds after the signal is lost and will stay locked out until the GUARD signal
returns for a pre-set amount of time. It is important to understand that this logic requires that the
loss of signal associated with the operation of an overreaching relay element must only be
caused by a fault on the protected line. Loss of signal due to external line faults will cause false
trips. Therefore, the Deblocking Overreach Distance Protection Scheme Logic is used almost
exclusively with power line carrier communication.
41 / 172
PROTECTION USING TELECOMMUNICATIONS
CIGRE JWG 34/35.11
Typical power system busbar configurations are shown on Figure 3.2-1, Figure 3.2-2, and
Figure 3.2-3. Busbar protection is typically based on differential current principles.
Busbar protections are mostly configured with zones, one or more zones for bus A and one or
more zones for bus B. The busbar protection very often includes breaker failure protection, time
delayed typically 5 to 9 power frequency cycles.
Bus A Bus B
BP-A BP-B
CB-A-L1 CB-B-L1
Id-A CBFP d CBFP Id-B
-A-L1 -B-L1
Notation :
Line 1
Bus-A is section A of the bus.
c
Transf
c
The protection system has to detect faults and initiate actions on following faults:
42 / 172
PROTECTION USING TELECOMMUNICATIONS
CIGRE JWG 34/35.11
Fault location c :
This is a fault for line protection or transformer protection, see Chapter 3.1 and 3.3.2.
Fault clearing time will normally exceed 5 cycles. As the current transformer and circuit breaker
are very close, this fault is very seldom. If the line protection is performed by distance relays,
transmitting a carrier signal to accelerate the 2nd zone of the line protection, at the remote line
end, would provide a good solution.
Fault location c:
If breaker CB-A-L1 (CB-B-L1) is stuck, CBFP-A-L1 (CBFP-B-L1) has to trip bus A (B). There is
no need for telecommunication in this case.
43 / 172
PROTECTION USING TELECOMMUNICATIONS
CIGRE JWG 34/35.11
Bus A Bus B
Line 1 T1 is transformer 1.
Line 2
c c CB-A-L1 is circuit breaker
A for line 1.
CB-L3-L4
CB-A-L3 CB-B-L4 CB_L1-L2 is circuit breaker
CBFP CBFP between line 1 and line 2.
-A-L2 -B-L2
a b CBFP-A-F1 is circuit
breaker failure protection
for breaker A on feeder 1.
CB-A-T1 CB-T1-T2 CB-B-T2 Feeders may be lines,
CBFP CBFP
-A-T1 -B-T2 transformers or any other
feeder.
T1 T2
Id-A is current differential
d d protection for bus zone A.
Fault location between CB and CT, exemplified with fault location e (h) :
Busbar protection zone A trips Bus A. But the fault is not yet cleared - there is still infeed from
bus B and Line 1.
To obtain fast fault clearing, the breaker failure protection 'CBFP-A-L1' trips breaker CB-L1-L2
and must initiate tripping of remote breaker(s) on Line 1. This remote tripping can be executed
either by direct intertripping of breakers, or by ’commanding’ or helping line protection systems
on Line 1 to trip the line at least at the remote end. Telecommunication is needed. Automatic
reclosing is not wanted on busbar faults, so if line protection execute the trip, it should be three
phase without initiation of automatic reclosing.
Fault clearing time will normally exceed 5 cycles. As the current transformer and circuit breaker
are very close, this type of fault is rare in practice.
If the line protection is performed by distance relays, transmitting a carrier signal to accelerate
the 2nd zone of the line protection, at the remote line end, would provide a good solution.
44 / 172
PROTECTION USING TELECOMMUNICATIONS
CIGRE JWG 34/35.11
Fault location c :
If breaker CB-A-L1 (CB-B-L1) is stuck, CBFP-A (B) has to trip Bus A (B). There is no need for
telecommunication in this case.
If breaker CB-L1-L2 is stuck, the breaker failure protection of that breaker has to initiate tripping
of remote breaker(s) of Line 1 (2). This remote tripping can be executed either by direct
intertripping or by ’commanding’ or helping line protection systems on Line 1 (2) to trip the line
at least in the remote end. Telecommunication is needed. Automatic reclosing is not wanted on
busbar faults, so if line protection execute the trip, it should be three phase without initiation of
automatic reclosing.
Fault clearing time will normally exceed 5 cycles. As the current transformer and circuit breaker
are very close, this type of fault is rare in practice.
Fault location f or g :
If current measurement for line protection of Line 1 and Line 2 ’crosses’, this is similar to ’Fault
location c’ above.
45 / 172
PROTECTION USING TELECOMMUNICATIONS
CIGRE JWG 34/35.11
BP-A BP-B
I-A-L1 I-B-L1
Id-A Id-B
Notation :
CB-L1
Line 1 Bus-A is section A of the bus.
c T1 is transformer 1.
Fault location c:
Busbar protection zone A and/or B trips bus A and/or B dependent of isolator positions. But the
fault is on the line side of the breaker. Therefore, the fault is not cleared. To achieve fast fault
clearing, trip command from busbar protection - dependent of isolator position - must initiate
tripping of remote breaker(s) of Line 1(n). This remote tripping can be executed either by direct
intertripping or by ’commanding’ or helping line protection systems on Line 1(n) to trip the line at
least in the remote end. Telecommunication is needed. Automatic reclosing is not wanted on
busbar faults, so if line protection executes the trip, it should be three phase without initiation of
automatic reclosing. Fault clearing time will not necessarily exceed 5 cycles.
Fault location d:
The protection initiates a trip command, but the fault is not yet cleared. In order to clear the fault
busbar protection zone B is designed to trip bus B if receiving a signal from zone A for more
than 5 cycles.
46 / 172
PROTECTION USING TELECOMMUNICATIONS
CIGRE JWG 34/35.11
Substation
Intertripping
(telecommunication)
Short or long
overhead
power line
Step-up
transformer
Transformer protection
&
Stop Generator protection
Generator
~
47 / 172
PROTECTION USING TELECOMMUNICATIONS
CIGRE JWG 34/35.11
Lockout
Power line
protection
Transformer
protection
Trip
Trip
Telecommunication
system
Intertrip
Intertrip
Reactor Reactor
Reactor Reactor
protection protection
48 / 172
PROTECTION USING TELECOMMUNICATIONS
CIGRE JWG 34/35.11
beginning in power transmission lines, busbars, transformers, and so on. If faults cannot be
cleared by a main protection, however, successive operations are needed in the forms of
backup, multi-zone and/or system-wide protections.
Wide-area or
Remote backup system-wide
Local backup protection protection
protection
Main protection #2 Multi-zone
(Redundant or backup) protection
Main protection #1
Protected zones/area
Figure 3.4-1: Relationship between protected area and operate time with respect to protection
schemes
On EHV networks it is common practice to use duplicated line protections as circuit local back-
up protection; a main protection (#1) and another redundant main protection (#2), taking
account of maintenance or failures of one of the two main protections.
A remote back-up protection is located in a substation remote from that substation in which the
corresponding main protection is located. The conventional remote back-up protections employ
distance relays and utilize local electrical data for operating in zone 2 or wider zones. Figure
3.4-2 shows a network protected by distance protections without telecommunications. The
distance protection uses current and voltage measured at one end of the power line. The
protection uses these measurements to decide if the fault lies within the zones of the distance
protection. A zone of the distance protection is open at the remote end. Zone-1 of the distance
protection covers only about 85% of the power line. Zone-2 of the distance protection at A
reaches beyond the remote terminal B. Zone-1 of the distance protections at B and zone-2 of
the distance protection at A both detect fault close to B on the power line from B to C. To obtain
rapid fault clearing, distance protections operate instantaneously when the fault occurs within
zone-1. To obtain selectivity we have to delay the tripping for faults within zones-2 and 3. This
49 / 172
PROTECTION USING TELECOMMUNICATIONS
CIGRE JWG 34/35.11
Zone-2 of the distance protection at A must cover the entire power line from A to B. Zone-2 of
the distance protection at A must not reach beyond zone-1 of the distance protection at B.
Zone-2 of the distance protection at A backs up the distance protection at B. However, this is
true for only one part of the power line from B to C. Zone-3 of the distance protection at A
provides back-up for the rest of the power line from B to C. We have to delay the tripping from
zone-3 of the distance protection at A more than the tripping from zone-2 of the distance
protection at B, direction C.
Splitting protection for busbar using communication for multi-circuit multi-terminal line
For the configuration of double busbar and double circuit transmission lines, if a fault persists
due to a CB failure or main protection failure, separation of the busbar by using splitting
protection before remote back-up operation is effective to prevent interruption. However, for
multi-terminal lines the splitting protection is done by sequential tripping and the operation time
may not be coordinated with remote back-up operation. Figure 3.4-3 gives a sample application
for three-terminal transmission lines.
Figure 3.4-3: Splitting protection (BD) using telecommunications for multi-circuit and multi-
terminal line. Ry, CB and Td denote operating times of relay (30 ms) and CB (40
ms) and time delay for coordination, respectively.
50 / 172
PROTECTION USING TELECOMMUNICATIONS
CIGRE JWG 34/35.11
Splitting protections operate sequentially from (1) to (2), and then to (3). Therefore, it cannot be
coordinated with the operation time (340 ms) of remote back-up protection (zone 2 of distance
relay) of substation A, and remote back-up tripping occurs at the substation A end on both lines,
which results in the isolation of substation C. To prevent such isolation, splitting protection at
substation C performs transfer tripping of busbar CBs at substations A and B using
communication channels. Busbars at substations A and B are separated within 260 ms which
allows coordinating of the remote back-up protection. Lit.: [4].
51 / 172
PROTECTION USING TELECOMMUNICATIONS
CIGRE JWG 34/35.11
connected to that busbar. The data are transmitted by the terminal equipment to the central
equipment through data communication channels. As this protection scheme has to be installed
for every busbar, one central equipment may cover two or more protected areas or busbars. For
the double-busbar and double-circuit configuration shown in the figure, the conventional back-
up protection firstly performs busbar splitting protection to prevent the interruption of a sound
circuit or isolation of transmission lines, which leads to longer operate time, wider outage area
or isolated transmission lines. When a fault occurs at F in the busbar in substation B, for
example, and if the busbar protection fails to operate, the conventional remote back-up
protections or distance relays of substation A and C operate in zone-2 after the bus-tie splitting
protection operates to prevent disruption of the sound circuits. The wide-area back-up
protection operates to minimize the outage area, which is the same as the main protection in
this case. Therefore, the operate time is 140 ms shorter than the conventional protection and
the outage area is smaller. Lit.: [6].
The wide-area current differential protection system requires wide-area timing synchronization
for simultaneous current sampling. As some current differential multi-terminal line protections
employ centralized timing synchronization scheme in their telecommunication circuits, a similar
scheme may be applied to such wide-area protections. More terminals, however, lead to the
complexity of achieving total synchronization among the terminals using telecommunication
circuits. Satellite-based wide-area timing synchronization such as GPS may be an alternative
solution. Since back-up protections are initiated after a main protection operated, delays for
transmitting current data and tripping signals are not necessarily crucial, while timing
synchronization and data integrity and reliability are still important.
52 / 172
PROTECTION USING TELECOMMUNICATIONS
CIGRE JWG 34/35.11
Since this kind of wide-area protection system employing telecommunications can collect
various kinds of power system data simultaneously sampled throughout the area, further
sophisticated power system monitoring, control, protection, and restoration could be achieved.
A predictive out-of-step protection [10] operates for preventing total system collapse caused by
step-out between large-capacity generator groups due to a serious fault in the trunk power
transmission line as shown in Figure 3.4-6.
When a double-fault occurs along both circuits of a double-circuit line forming one route, the
substations at both ends of the line are disconnected and power transmission capability is
interrupted. If a successive fault occurs after reclosing, a slow cyclic power swing develops
between the western generator group and the bulk power system.
The same situation occurs in case of failure of a busbar protection to operate during a busbar
fault. Over time, the phase difference of the generator groups thus undergoes oscillating
divergence. If this condition is not corrected, an out-of-step situation will begin to occur in
various parts of the power system and may lead to total collapse of the power system. Taking
account of this characteristic of the power system, the western area can be isolated from the
bulk power system before an out-of-step situation occurs and then be operated independently.
This eliminates power swing between the generator groups of the two systems and restores
stability.
This separation of the western area is performed in a manner to preserve the power supply and
demand. The separation point is selected based on the power flow at pre-determined points for
separation before the fault. Adjustment of the supply/demand balance of each area after
separation is performed by governor control of the corresponding generator groups. The
western generator group, however, may under certain conditions becomes overloaded. In this
case, load shedding via under-frequency relays is relied upon to correct the unbalance. This
protection is accomplished by using on-line voltage data, or busbar voltage waveforms,
collected from the generator group by central equipment to predict step-out based on the
measured voltage phases and then issuing a system separation command. This system
consists of central equipment and RTUs, and requires sampling synchronization for the voltage
phase measurement. The telecommunication requirements from this protection are almost the
same as the wide-area current differential protection described above. The required overall
operating time is less than a few hundreds of milliseconds, where transmission time including
initiation and processing of frame-formatted cyclic data transmission (Tac in Figure A1-5) should
be less than several tens of milliseconds, and propagation delay requirement including media
and equipment delay be at most several milliseconds.
53 / 172
PROTECTION USING TELECOMMUNICATIONS
CIGRE JWG 34/35.11
Another system stabilizing protection, which consists of central processing unit, fault detecting
unit, and transfer trip unit, operates for stabilizing power frequency or transient instability [11].
The central processing unit collects data on generated energy and load as controllable
quantities from power stations and substations, automatically recognizes electric power system
connections, performs calculations in advance to prepare for faults, and automatically
determines control quantity and objects for each pattern of separation. If a fault occurs, the
central processing unit sends a trip signal to the transfer trip unit based on the calculation
results.
The fault detecting unit detects a route disconnection fault in any of the EHV lines, and
calculates power flow through the main lines, frequency, and voltage drops, and transmits these
data to the central equipment. If faults occur, the transfer trip unit receives a transfer trip signal
from the central processing unit, and sheds the generators and/or loads as controllable
quantities based on the received information to stabilize the frequency of each separated part.
54 / 172
PROTECTION USING TELECOMMUNICATIONS
CIGRE JWG 34/35.11
The telecommunication link should have a high degree of availability and should transmit the
protection signal as fast as necessary to the remote station with the highest possible reliability.
The actual requirements on transmission speed, dependability for wanted operation and
security against unwanted operation may vary for different protection schemes and line
configurations. Practical and economical reasons may define which type of transmission
medium has to be used.
All communication systems are subject in varying degrees to interference and noise of various
forms. These can corrupt the information arriving at the receiver, either by simulating a signal
when no such signal has been transmitted, or by delaying or blocking a true signal. In analog
systems, there are many ways in which transmission can be degraded. For example, the signal-
to-noise ratio may be poor, or the signal may suffer distortion or crosstalk from one user to
another, or the system may clip the input signal. In comparison, a digital system has the
parameters: bit rate, error rate, delay, and delay variation. Channel impairments may result in
bad messages, no messages, excessive message delay, excessive message delay variation
and/or excessive delay difference in the transmit and receive direction.
The quantity of information per unit time (bits per second) which a communication channel can
transfer depends on its bandwidth and on the received signal quality1 (normally expressed as
Signal-to-Noise Ratio, SNR).
The signal transfer delay introduced by the medium is normally low for terrestrial links, since in
most media the signals propagate typically at speeds between 60% and almost 100% of the
speed of light in vacuum. The propagation delay is for example about 3.3µs/km for open-wire
(e.g. Power Line Carrier) and microwave radio links, about 5µs/km for optical fibres and 5 ....
10µs/km for pilot wires. The significant part of the overall operating time of a teleprotection
system is normally introduced by the terminal equipment including their interfaces to the
protection, by intermediate repeater stations and network node devices with channel routing
functions. See also Figure A1-5 in ANNEX A1.
Transmission time delay, bandwidth and signal quality are important parameters when
considering the design of a telecommunication system used for protection. The criteria apply
equally for both analogue and digital communication systems. For digital systems it is however
1
The maximum information flow that a communication channel can transfer without errors is called its capacity. According to
Shannon's law the channel capacity is given by the formula C = B x ld(1 + SNR), with C = Capacity in bits/s, B = Channel
bandwidth in Hertz, ld = logarithm to the base of 2, and SNR = Signal-to-Noise Ratio of the received signal. The channel capacity
is a theoretical value that can only be approximated at the cost of excessive signal transfer delay due to infinite coding- and
decoding efforts. The formula also indicates that a bandwidth related data rate increase is compromized by the bandwidth related
SNR deterioration (=> the wider the bandwidth is, the more noise is captured).
55 / 172
PROTECTION USING TELECOMMUNICATIONS
CIGRE JWG 34/35.11
more convenient to use the data rate instead of the bandwidth and to express the transmission
quality in terms of bit errors (e.g. bit error rate, errored seconds etc.) rather than signal-to-noise
ratio.
Circuit or service providers however may offer circuits or services with guaranteed performance,
which seem to be applicable to protection.
Analogue communication systems have enhanced protection systems for many years. Their
advantage is their efficient use of bandwidth, especially for the transmission of analogue signals
such as voice. Historically, analogue communication systems provided analogue circuits to the
user.
The situation has changed with the advances in digital electronics and signal processing, with
the development of bandwidth efficient digital modulation principles and with the breakthrough
in optical fibre technology. Due to the availability and the advances in digital communications, it
is increasingly being used for the protection of power systems. Digital communication systems
may provide both analogue circuits (e.g. for voice, telefax and modems) and digital circuits (for
data) to the user.
56 / 172
PROTECTION USING TELECOMMUNICATIONS
CIGRE JWG 34/35.11
Important parameters for analogue circuits are the bandwidth, the frequency response ( =
attenuation and group delay) and the signal-to-noise ratio at the receiver input. Analogue
circuits are characterized by their “graceful degradation” under disturbed channel conditions, i.e.
the quality of the received signal deteriorates gradually with increasing disturbance and noise.
Important parameters for digital circuits are the bit rate, the data transfer delay and delay
variation (timing jitter) and the error rate of the received data. The impairments of the
communication medium, which may be quite severe, are hidden from the user. Error rates can
be bounded to very low values by placing regenerative repeaters at periodic intervals
(intermediate stations) along the physical medium.
Digital circuits are characterized by their “threshold behavior” under disturbed channel
conditions. Simply speaking, they are either very good or not available.
The protection of power systems normally imposes very stringent demands on the
communication system regarding its real-time properties. The signal transfer time and transfer
time variation is for example much more critical for protection signal transmission than for
general data or voice communication.
Networks can enhance the availability of a protection system when the network inherent
redundancy and route diversity is exploited. Measures have however to be taken to ensure that
automatic re-routing is prevented from re-using the same bearer (e.g. the same fibre cable)
when attempting to re-direct a channel which has failed, thus destroying the diversity concept.
Pre-definition of a primary and an alternate path with ensured diversity and guaranteed signal
transfer delay is suggested.
Special attention has to be paid to networks where the protection information may pass through
network nodes with switching, routing and loop-back facilities, or when the protection signal
57 / 172
PROTECTION USING TELECOMMUNICATIONS
CIGRE JWG 34/35.11
shares an aggregate with other services. Switching, routing and multiplexing techniques bear a
certain risk that a transmitted signal is directed to a receiver which it was not originally intended
for (channel cross-over or signal loop-back).
The consequences of signal misdirections on protection are different for analog comparison and
state comparison protection schemes. For example, signal misdirection is typically less critical
for state comparison protection systems that are normally in the guard (non-operate) state, than
for analog comparison protection systems, which depend on continuous exchange of
information between line ends and may immediately trip the line if signals from the wrong
transmitter are received.1
In addition to inadvertent signal misdirection there exist some other network-related risks that
are new or have a different impact when compared to traditional ‘hard-wired’ point-to-point links,
for example:
- Automatic re-route to some non-defined alternate path with inadequate performance for
protection
- Automatic re-route to a pre-defined non-preemptible (dedicated) path
- Excessive outage time until re-route completed
- Different propagation time delays between the various paths selected
- Possibility of different go and return propagation time delays
- Protection circuits may be bumped at the expense of others when re-routing after a link
failure, unless prevented by adequate circuit priority rating mechanisms
- Channel may not revert back to its original path unless manually optimized, eg on a least
cost basis
- Unacceptable signal transfer delays due to queuing mechanisms in networks with
dynamic bandwidth allocation
- Availability may be less than expected due to the particular definition of "Available Time"
for telecom ISDN circuits according to ITU-T G.821
58 / 172
PROTECTION USING TELECOMMUNICATIONS
CIGRE JWG 34/35.11
tendency is to replace pilot wires by optical fibres which are free from electromagnetic
interference, their use may still be justified for economical reasons.
Pilot wire circuits may be utility owned or rented from telecommunication companies. Utility
owned pilot wires often follow the same route as power cables. Since pilot wires may be subject
to dangerous induced voltages during faults in the primary system, appropriate installation
precautions must be taken in order to prevent maloperation, hazards to personnel and damage
to equipment.
The electrical parameters of pilot wires such as signal attenuation and signal delay per unit
length depend on their mechanical parameters like wire diameter, insulation material and cable
construction, as well as on the signal frequency. Values for the attenuation coefficient between
0.5 dB/km and 3 dB/km in the audio frequency range are typical.
The signals, which are transmitted over pilot wires are historically sometimes DC signals or
signals at power frequency (50 or 60 Hz) e.g. from pilot wire differential relays. Transmission of
DC or AC signals at power frequency is hardly used any more due to the pronounced
susceptibility to interference from the primary system. Normally the information is modulated
onto a carrier which “shifts” the information from the power frequency range into the audio
frequency range for transmission. At the receiving end, the information signal can be separated
from the power frequency by means of filtering. This function is usually performed by means of
a teleprotection equipment operating over a 2- or 4-wire circuit.
2-wire circuits use the same pair of wires for transmitting and receiving. Transmit and receive
signals are normally separated by their respective frequencies. With 4-wire circuits, a pair of
wires is allocated to the transmitter and a pair of wires is allocated to the receiver. The same
frequency is normally used for transmitting and receiving.
A typical application for pilot wires is the transmission of binary on/off protection commands
using dedicated teleprotection equipment in conjunction with distance or directional comparison
relays. The protection command is modulated onto an audio frequency carrier somewhere in the
0.3 kHz to 3.4 kHz range, which makes the transmission less susceptible to power frequency
interference and high frequency noise. The teleprotection equipment may also multiplex several
commands from different relays onto the same wires.
Internet access and multimedia services had a tremendous impact on the development of new
high speed transmission principles for copper wires. High-speed modems would allow the use
of pilot wires for higher data rates, ranging from several tens of kbit/s for voiceband modems to
up to 10 Mbit/s over short distances for wideband (xDSL) modems. However, due to their
inherent high signal transfer delay (latency) and their sensitivity to channel disturbances, the
use of high-speed modems is not recommended for the transmission of protection signals.
Electromagnetic interference, power frequency harmonics and wideband noise produced by
faults in the power system are likely to block the modem receiver just in that moment when the
communication is truly needed.
59 / 172
PROTECTION USING TELECOMMUNICATIONS
CIGRE JWG 34/35.11
Summary
Advantages and disadvantages of Pilot Wires as related to protection signal transmission are:
Advantages Disadvantages
• High availability and reliability with MTBF • High sensitivity to induced voltages in the
in the order of 200’000 to 500’000 hours event of power line faults and lightning
• Wide deployment strokes
• Low cost, especially when also used for • Problems with potential barriers at the
other purposes station entrance
• Little interference from power lines if • Crosstalk between circuits in the same
separate routing is used cable deteriorates performance and
reduces link lengths
• Buried cables my be damaged or broken
by civil works
• Short to medium link lengths only, due to
the attenuation, bandwidth, crosstalk and
interference constraints
• High cost of new cables, e.g. when civil
works are required.
PLC systems have been extensively used for more than 60 years on HV and EHV lines for the
transmission of voice, control data and protection signals. PLC links are entirely under the
control of the power utility. They normally provide the shortest and most direct connection
between line ends, power stations and substations and are in many cases justified by the
transmission of protection signals, where PLC links have proven to perform very effectively.
Continued operation has even been reported for power lines, which were broken down after an
earthquake. Due to their reliability PLC links are often the preferred back-up medium for
selected important channels of wideband communication systems. This is especially true for
protection signals.
The carrier frequency range which can be used by PLC systems is normally between 40 kHz
and 500 kHz. It is sometimes subject to national regulations to prevent interference with other
systems operating in the same frequency band.
The carrier frequency range between 40 kHz and 500 kHz is subdivided into slots of 4 kHz
bandwidth. A PLC link may typically use one to four such slots for transmitting and receiving,
depending on the number of channels and on the technology used.
Traditional Analogue PLC transmitters translate a voice frequency band of 4 kHz gross
bandwidth into one of the 4 kHz carrier frequency slots using single sideband (SSB) modulation.
The voice frequency baseband may contain speech, superimposed data and protection signals
which share the channel by means of frequency division multiplexing (FDM, see 4.4.1.1). During
60 / 172
PROTECTION USING TELECOMMUNICATIONS
CIGRE JWG 34/35.11
the transmission of protection commands the speech and data signals may be switched off such
that the maximum transmit power is available to the protection signal. This "boosting" of the
protection signals compensates the additional signal attenuation, which is introduced by the
fault on the protected power line when signalling over faulty lines. As voice and data are
interrupted during protection signalling, boosting is not recommended for the transmission of
persistent commands, as might be the case for reactor protection for example.
Emerging Digital PLC systems translate serial digital data into one or several 4 kHz slots at
carrier frequency range using bandwidth efficient digital modulation techniques, such as
quadrature amplitude modulation (QAM) or multicarrier (MCM) modulation. The serial aggregate
data may accommodate digitized speech and digital data by time-division-multiplexing (TDM,
see 4.4.1.2). Protection command transmission is usually accomplished by means of a
dedicated subsystem in order to achieve the required dependability and minimum signal
transfer delays under faulty line conditions.
For both analogue and digital PLC systems the signal at carrier frequency is amplified to
typically 5 to 100 Watts output power (PEP, peak envelope power) and coupled to the power
line via an impedance matching device and a high voltage coupling capacitor. For optimum
transmission performance under faulty line conditions coupling onto two phases in “push-pull”
mode is normally preferred. Line traps in series to the power line prevent the carrier signals from
being shunted by the local busbar and prevent signal leakage to adjacent lines. Several PLC
terminals may share a common coupling equipment.
The propagation of the signal along a multi-conductor power line may be explained by the
combined transmission of independent modes whose number is equal to the number of non-
earthed conductors above ground. Each mode propagates with its specific attenuation and
velocity. The signal attenuation depends on the construction of the power line, the line condition
and on the carrier frequency used. It is typically in the range of 0.02 dB/km to 0.2 dB/km,
increasing with frequency.
Corona noise results from electric impulse discharges along the surface of the phase
conductors. Its spectrum extends well into the carrier frequency range. Corona noise is always
present on an energised line and is perceived as background noise in a PLC receiver. Its level
depends on the power system voltage and design, the climatic conditions and the altitude above
sea level. It normally does not constitute a problem to protection signal transmission since its
level is less than other channel impairments caused by line faults for example.
Isolator operation creates high frequency noise of high amplitudes which cause poor signal-to-
noise ratios in the PLC receiver. Its duration may last some seconds depending on the isolator
design. The signal quality degradation depends largely on the method of coupling and on the
characteristics of the equipment. The interference produced by isolator noise is most severe in
comparison with other noise sources. Because it occurs under healthy line conditions it may
cause unwanted operation of the protection system.
During line faults the PLC channel is subject to strong transient noise at the onset of the line
fault until the arc has established, followed by an immediate increase in signal attenuation due
61 / 172
PROTECTION USING TELECOMMUNICATIONS
CIGRE JWG 34/35.11
to the short circuit of the faulty phase(s). During the interruption of the fault current, noise is
produced again by the operation of the circuit breakers.
Interference produced by power system faults occurs during the time when the protection is in
active operation. It may therefore prevent operation of the protection system.
Channel impairments during line faults are the primary reason why PLC links have so far been
restricted for two applications for protection signal transmission, where they have however
proven to perform most effectively:
- Transmission of binary status information in conjunction with distance protection or
directional comparison relays in state comparison protection schemes
- Transmission of phase comparison signals in conjunction with phase comparison relays
in analog comparison protection schemes.
Summary
Advantages and disadvantages of PLC links as related to protection signal transmission are:
Advantages Disadvantages
62 / 172
PROTECTION USING TELECOMMUNICATIONS
CIGRE JWG 34/35.11
From a legal point of view terrestrial microwave radio systems may be broadly categorized into
licensed radio and unlicensed radio systems:
Licensed radio systems operate in a "protected" frequency range that has been licensed to the
utility by national authorities. Licensed radio systems typically constitute point-to-point multi-
channel links that are used in the backbone of the communication network.
Unlicensed radio systems operate in an "unprotected" frequency range that is open to the
public. Unlicensed radio systems usually share a common frequency band and support point-to-
multipoint communication. Access to the shared medium (i.e. the common frequency band) is
accomplished either through TDMA (Time Division Multiplex Access) or CDMA (Code Division
Multiple Access), or a combination of the two, to prevent mutual interference between users.
See also chapters 4.4.1.2 and 4.4.1.3.1
In legacy analog microwave systems a number of voice baseband channels with 4 kHz
bandwidth each are combined onto a single aggregate signal by frequency division multiplexing
(FDM, see 4.4.1.1). One or several of the 4 kHz baseband channels may be used individually or
collectively for the transmission of protection signals.
Earlier analogue microwave systems used frequency modulation (FM) where the analogue
aggregate FDM signal varies the frequency of the emitted carrier. Analogue microwave systems
are mainly of historical interest since they have been gradually replaced by digital systems.
In digital microwave systems a number of digital data channels of typically 64 kbit/s each are
combined onto an aggregate data stream using time division multiplexing (TDM, see 4.4.1.2).
Analogue signals such as speech are converted into digital data prior to multiplexing. One or
several of the digital 64 kbit/s channels may be used either individually or collectively for the
transmission of protection signals.
In digital microwave systems frequency modulation has been replaced by phase shift keying
(PSK) modulation or combined phase-amplitude shift keying, which is also called quadrature
amplitude modulation (QAM), with 16-QAM being widely used today. Higher level QAM like 64-
QAM or 128-QAM provide a higher bandwidth efficiency, i.e. they allow to transmit more bits per
second in a given bandwidth, however at the expense of an increasing susceptibility against
interference and noise.
Licensed microwave radio links are normally point-to-point with maximum distances between 40
and 100 km. The distances that can be covered depend on the transmitter output power, on the
frequency band used, on atmospheric conditions, on the topography and on obstacles, which
may impede signal propagation or cause signal reflections. Signal reflections may lead to
multipath propagation which causes a certain additional attenuation or signal extinction when
the direct wave and the reflected wave are opposite in phase at the receiver.
Waves reflected by the ionized part of the atmosphere or by a changing refractive index due to
temperature or humidity variations have the same effect, but since the degree of reflection is
subject to a random process, the received signal varies statistically with time. This phenomenon
is called “fading” as the received signal can fade or disappear on a statistical basis.
1
TDMA and CDMA are general media access technologies that are for example typically used in point-to-multipoint radio systems
where many users share a common frequency band.
63 / 172
PROTECTION USING TELECOMMUNICATIONS
CIGRE JWG 34/35.11
These drawbacks can be overcome by careful link planning, by the positioning of intermediate
repeaters, by the selection of the transmitted power and by the antenna design.
Diversity is commonly used to improve the availability of microwave links by adding some
degree of redundancy. Space diversity is obtained if different antennas are located in different
positions on the antenna tower. Frequency diversity is used when the same signal is transmitted
using different frequencies. At the receiving side the signals coming from different antennas are
combined to achieve the best possible signal at the output, permitting to limit the outage time of
the link during the worst period of the year.
Successful operation of such systems has been reported from South Africa. Both intertripping
as well as differential protection signals are transferred over point-to-point TDMA-based single-
channel radio links between outstations, with typical signal propagation delays (outstation to
outstation) in the range of 14ms to 22ms1 at data rates of 19.2kbit/s and 64kbit/s.
The use of unlicensed spread spectrum radio for the transmission of state indication in a state
comparison scheme for a 138 kV line has been reported from the USA.
Summary
Advantages and disadvantages of microwave radio links as related to protection signal
transmission are:
Advantages Disadvantages
64 / 172
PROTECTION USING TELECOMMUNICATIONS
CIGRE JWG 34/35.11
Optical fibres are normally used in pairs, i.e. one fibre is used for transmitting and one for
receiving. Communication over one fibre in both directions is technically possible, for example
using time-shared multiplexing or wavelength division multiplexing (WDM, see chapter 4.4.1.1)
techniques. It has however been rarely used for long distance telecommunication systems so
far.
A number of optical fibres (10 … 50 … 100) are normally embedded in an underground or aerial
cable. The immunity against electromagnetic disturbance allows installing fibre-optic cables
along the same route as power cables. They may also be integrated into power cables or
ground wires of HV power lines. The latter design which is called OPGW (OPtical Ground Wire)
is preferably used by electric power utilities. Other popular techniques are the mounting of
ADSS (All Dielectric Self-Supporting) Cables along the towers, or the Helical Wrapping of a
fiberoptic cable around the ground wire or phase wire, which may be advantageous for
refurbishing existing lines. Lashed aerial cable techniques are also used whereby an all-
dielectric cable is lashed to a messenger (e.g. earth wire) by means of a tape or cords. In all
cases the mechanical strength of the towers has to be examined regarding the additional load
introduced by the optical cables, especially when extra loads due to snow and ice are to be
expected.
Care must be taken with ADSS and Helical Wrap cables to avoid surface erosion caused by
dry-band arcing in high field strength locations.
For long distance links, Multimode Step-Index fibres and multimode Graded Index fibres are of
historical interest only. They have been almost completely superseded by Single Mode fibres
which provide a very large bandwidth over a long distance.
The transmission properties of optical fibres are characterised by their attenuation per unit
length (dB/km) and by their chromatic dispersion (ps/nm∗km). Chromatic dispersion means that
65 / 172
PROTECTION USING TELECOMMUNICATIONS
CIGRE JWG 34/35.11
At 1300 nm optical fibres naturally exhibit minimum dispersion which introduces minimum pulse
distortion at high data rates. At 1550 nm the attenuation is lowest, however the dispersion is
higher than at 1300 nm. Special fibre designs called Dispersion Shifted Fibres minimize the
chromatic dispersion at 1550 nm, however at the expense of a higher attenuation due to
mechanical stress combined with certain penalties when used in WDM systems [12]. The
maximum length of an optical fibre link may therefore be either attenuation limited or dispersion
(bandwidth) limited which is an important system planning issue for high capacity long-haul
links. Very long distances can be overcome by means of optical boosters and amplifiers which
inject more light power into the fibre at the transmit side and amplify the received signal on an
optical basis at the receiving end.
Laser Diodes (LD) or Light Emitting Diodes (LED) may be used as optical transmitters. Laser
diodes are required for long repeater spans (up to about 100 to 200 kilometres, depending on
the bit rate) and high bitrates (up to some Gigabits per second), whereas LEDs are cost efficient
for shorter distances and lower data rates. The optical power injected by a LD into a single
mode fibre is in the order of 1 Milliwatt, that of an LED is around 10 to 20 Microwatts. The
emitted wavelength of both LDs and LEDs is in the infrared range at either around 850nm,
1300 nm or 1550 nm. Special optical transmit- and receive devices such as Optical Boosters
and Erbium Doped Fibre Amplifiers (EDFA) may be used for bridging extra long distances of
several hundred kilometers without intermediate repeater stations.
Wavelength Division Multiplexing (WDM) may be used to further exploit the huge transmission
capacity of optical fibres, or simply to use the same fibre for different communication systems by
“stacking” their optical transmitters onto the same fibre, each transmitter using a different
wavelength. More on the subject is found in chapter 4.4.1.1 and in [12].
As applied to protection signal transmission, either dedicated optical fibres from relay to relay
may be used, or the protection signal may be electrically or optically multiplexed with other
services, as shown in ANNEX A1, Figures A1-2 and A1-3. Whilst the installation of dedicated
optical fibre cables for the transmission of protection information would match the traditional
point-to-point approach and guarantee minimum signal transfer delays, it might not be easily
justified for cost reasons. However, the use of dedicated fibres is facilitated when the
incremental cost of extra fibres in a cable are low, or when “spare” fibres can be used. A more
economical means to achieve a certain isolation of the protection from other services and/or
systems is to perform the multiplexing at the optical level using WDM (Wavelength Division
Multiplexing), where only the optical fibre but not the terminal equipment is shared between
individual systems. More on the subject of WDM is found in chapter 4.4.1.1 and in [12].
Fibre optic communication systems are - with very few exceptions - realised as digital systems.
Since the optical fibre represents a wideband medium, a large number of channels and services
are usually combined into an aggregate by some form of time-division-multiplexing (TDM, see
Chapter 4.4.1.2). The aggregate digital bitstream finally modulates the optical transmitter (Laser
diode or LED) by switching it on and off in accordance with the data to be transmitted.
66 / 172
PROTECTION USING TELECOMMUNICATIONS
CIGRE JWG 34/35.11
Summary
Advantages and disadvantages of optical fibre links as related to protection signal transmission
are:
Advantages Disadvantages
• Wideband medium, supports extremely • Many channels are lost when a high
high data rates capacity fiberoptic link fails
• Immune against electromagnetic • Repair is difficult when fibres are
interference from the primary system (at integrated into high voltage cables or
the optical level) OPGWs
• Immune against athmospheric interference • High installation cost when only moderate
• Perfect electrical isolation between link data rates are needed.
ends and between high-voltage euipment • Dedicated fibres for protection signal
and telecom equipment transmission may not be justified for cost
• No crosstalk between fibres reasons
• Normally extraordinarily low bit error rate • For long distances (> 200km) repeater
stations have to be used
• No earth potential rise problems
• Little influence by atmospheric conditions
• Fairly long repeaterless distances possible
(…..200km)
4.3.5 Satellites
The race for satellite communication has been on ever since the announcement of pocket-sized
ground terminals to provide a truly global mobile telephone service. At present, there are many
different satellite systems that have been proposed to complement terrestrial communication
networks, all at varying developmental stages. Narrowband satellite systems which carry many
voice or low speed data channels - up to 9'600 bits per second - are more advanced in terms of
development than wideband systems supporting SDH and ATM (see Chapters 4.4.2.2, 4.5.1
and 4.6.2.2 on SDH and ATM). The reason is mainly due to new or more acute issues related to
creating broadband satellite links with QoS (Quality of Service) guarantees (ANNEX A3).
Projects have been launched worldwide to investigate the integration of terrestrial wideband
networks with satellite networks.
Satellites are usually classified according to the type of orbit they are in.
67 / 172
PROTECTION USING TELECOMMUNICATIONS
CIGRE JWG 34/35.11
As applied to protection signal transmission the delay introduced by a single LEO satellite up-
down link may be acceptable for certain protection applications, provided that the extra delay
possibly introduced by relaying the signal between satellites plus the delay introduced by the
terrestrial section can be kept sufficiently low. It is noted that signal interruptions of 3 to 9
milliseconds duration are expected about every 8 to 12 minutes when the signal is switched
from one satellite to the next (roaming): as the satellite descends towards the horizon, the traffic
being serviced by that satellite must be handed over to the satellite just ascending from the
opposing horizon. Moreover, the signal propagation delay variation as the signals are routed
dynamically from satellite to satellite before reaching the terrestrial destination will require
further detailed investigation, before MEO and LEO satellite channels may eventually be used
for conveying protection signals.
LEO satellite systems may eventually become a communication alternative for certain protection
applications when signal transfer delay and reliability requirements are not very demanding.
Little experience seems to exist today in this area. There are still many open research issues
that need to be addressed before such systems can be used.
68 / 172
PROTECTION USING TELECOMMUNICATIONS
CIGRE JWG 34/35.11
Summary
Advantages and disadvantages of satellite links as related to protection signal transmission are:
Advantages Disadvantages
69 / 172
PROTECTION USING TELECOMMUNICATIONS
CIGRE JWG 34/35.11
information signal may be either analog or digital, the combined FDM signal is inherently an
analog waveform. FDM is therefore primarily used with analogue transmission systems.
As WDM actually creates 'virtual fibres' it may also be employed for the de-coupling of
transmission systems from each other. Dedicated teleprotection links that operate quasi-isolated
from other telecom services could be realized using WDM for example: In Figure 4.4-1, system
1 consists of a protection relay with internal or external teleprotection function plus a fibre-optic
transmitter/receiver operating at wavelength λ1. System 2 could be any other fibre-optic
communication system operating at wavelength λ2 and carrying other services such as data and
voice. A failure or maloperation of System 2 should not adversely affect System 1, as the only
common parts of the two systems are the optical fibre and the passive optical wave-division
multiplexer / demultiplexer.
Although the isolation of the teleprotection from other services by means of WDM appears
attractive from an operational point of view, it may not be easily justified for cost reasons.
λ1 λ1
System 1 System 1
λ1+λ2
λ2 Optical fibre λ2
System 2 WDM WDM System 2
70 / 172
PROTECTION USING TELECOMMUNICATIONS
CIGRE JWG 34/35.11
Most modern telecommunication systems employ some form of TDM for transmission over long-
distance routes. The multiplexed signal may be sent 'directly' (called 'baseband' transmission)
over optical fibres, or it may be modulated onto a carrier signal for transmission over analogue
media, such as microwave radio or coaxial cables for example.
TDM can be split into various subclasses. The most important are Fixed TDM and Statistical
TDM.
Fixed TDM
In fixed TDM - sometimes also called synchronous TDM - each channel has its assigned
timeslot which sustains a fixed data rate and uses aggregate bandwidth irrespective of actual
user data being transmitted or not. The number of channels is normally equal to the number of
timeslots in a frame. Due to the fixed allocation of channels and timeslots, data can always be
transmitted. Buffering and flow control are not required. Continuous data flow at a fixed bit rate
without delay variations is ensured, a condition which is a prerequisite for protection signal
transmission.
Statistical TDM
Statistical - sometimes also called asynchronous TDM - multiplexers rely on the ‘bursty’ traffic
characteristics of certain information sources. Data may be transmitted in any timeslot as long
as there are free slots available. Relying on the statistics of the data, the number of channels or
the peak data rate which is supported by the statistical multiplexer may be larger than the total
number of timeslots or the aggregate data rate in a frame. Data buffering and flow control is
employed to store and withhold data until a free timeslot or free cells become available.
Buffering and flow control introduce extra delay as well as delay variations, and data may be
discarded in case of overload. Loss of information is normally not acceptable for protection
signal transmission. Statistical multiplexing has therefore to be avoided unless the required
quality of service is explicitly guaranteed.
A multiplexing technology which was originally intimately bound up with the emerging SDH
(Synchronous Digital Hierarchy, see 4.4.2.2) standards is ATM (Asynchronous Transfer Mode,
see also 4.5.2.3 and 4.6.2.2) which was conceived as a way in which arbitrary-bandwidth
communication channels could be provided within a multiplexing hierarchy consisting of a
defined set of fixed bandwidth channels. ATM multiplexers support both constant bit rate (CBR)
and variable bit rate (VBR) traffic, where CBR which basically emulates fixed TDM is a
prerequisite for today’s protection systems using telecommunication.
CDM and in particular CDMA (code division multiple access) is mainly used with unlicensed
spread spectrum radio where many simultaneous users have to share the same frequency
band. CDM/SS techniques may also be used with wire-based systems to enhance the
transmission capacity and noise immunity. Its application for inter-substation communication
would however need to be further examined with respect to cost efficiency and transmission
performance.
71 / 172
PROTECTION USING TELECOMMUNICATIONS
CIGRE JWG 34/35.11
The use of unlicensed single channel CDMA/SS radio for the transmission of protection
commands for a 138 kV line has been reported from the USA. However, no practical
installations of CDM/SS technology for the transmission of protection signals over copper wires
have been reported. A final conclusion on CDM is not possible at the time of writing.
Multiplexing structure
Digital telecommunication systems have historically been based on the plesiochronous digital
hierarchy (PDH). PDH systems accommodate "almost synchronous" channels in multiples of 64
kbit/s. The base rate of 64 kbit/s represents the digital equivalent of an analogue telephone
channel using traditional, uncompressed PCM speech coding techniques. The PDH hierarchy
levels and transmission rates are given in Table 4.4-1 below.
When multiplexing a number of digital signals with the same nominal bitrate they are likely to
have been created by different pieces of equipment each generating a slightly different bitrate
due to their independent internal clocks. A technique called “bit stuffing” is used for bringing the
individual signals up to the same rate prior to multiplexing. Dummy bits or justification bits are
inserted at the transmit side and discarded by the demultiplexer at the receiving end, leaving the
original signal. The same problem with rate alignment occurs at every level of the multiplexing
hierarchy. The process of multiplexing “almost synchronous” signals is called “plesiochronous”,
from Greek. The use of plesiochronous operation throughout the hierarchy has led to the
adoption of the term “Plesiochronous Digital Hierarchy”.
Plesiochronous operation does not allow extracting and inserting individual channels from the
aggregate without prior demultiplexing and subsequent re-multiplexing, leaving towers of
multiplexers. With the exception of vendor specific solutions, network management and
performance monitoring throughout the hierarchy is not adequately supported with PDH
systems either, as PDH systems have developed over time with insufficient provision for
standardized management. These disadvantages have - amongst others - finally led to the
definition of a new digital transmission hierarchy: the Synchronous Digital Hierarchy.
1
Some (legacy) systems may provide only 56 kbit/s to the user.
72 / 172
PROTECTION USING TELECOMMUNICATIONS
CIGRE JWG 34/35.11
Multiplexing structure
The rapid growth of digital networks and the convergence of telephone and high-speed data
networks have enforced the development of new standards, which would facilitate the
deployment of complex networks with new services and comprehensive network management
options. Proposals in ITU-T for a Broadband Integrated Services Digital Network (B-ISDN)
opened the door for a new synchronous multiplexing standard that would better support
switched broadband services. The new standard appeared first as SONET (Synchronous
Optical Network) in the United States. Initially, the objective of the SONET standard was to
establish a North American standard that would permit interworking of equipment from multiple
vendors (1985 …1987). Subsequently, the ITU-T (former CCITT) was approached with the goal
of migrating this proposal to a worldwide standard. Despite the considerable difficulties arising
from the historical differences between the North American and European digital hierarchies,
this goal was achieved with the adoption of the SDH (Synchronous Digital Hierarchy) standards
(1988). In synchronous networks, all multiplexing functions operate synchronously using clocks
derived from a common source.
SDH embraces most of SONET and is an international standard, but is often mistakenly
regarded an European standard, because most of its suppliers carry only the European PDH bit
rates specified by ETSI (European Telecommunication Standards Institute).
While there are commonalities between SDH and SONET, particularly at the higher rates, there
are significant differences at the lower multiplexing levels, in order to accommodate the
requirement of interworking the differing regional digital hierarchies. Through an appropriate
choice of options, a subset of SDH is compatible with a subset of SONET; therefore, traffic
interworking is possible. Interworking for alarms and performance management is however
generally not possible between SDH and SONET systems.
The ITU-T recommendations define a number of basic transmission rates within the SDH and
SONET, see table below, with further levels proposed for study.
SDH SONET
Max. number of
Synchronous Synchronous
Optical simultaneous voice
Transport Aggregate Rate Transport Signal Aggregate Rate
Carrier level channels
Module level level
(informative)
OC-1 STS-1 51.840 Mbit/s 783
STM-1 155.520 Mbit/s OC-3 STS-3 155.520 Mbit/s 2'349
STM-4 622.080 Mbit/s OC-12 STS-12 622.080 Mbit/s 9'396
STM-16 2’488.320 Mbit/s OC-48 STS-48 2’488.320 Mbit/s 37'584
STM-64 9’953.280 Mbit/s OC-192 STS-192 9’953.280 Mbit/s 150'336
SDH / SONET are expected to dominate transmission for decades to come, as the multiplexing
structure has been designed to carry not only current services but also emerging ones using
ATM and/or IP framing structures for example.
73 / 172
PROTECTION USING TELECOMMUNICATIONS
CIGRE JWG 34/35.11
Although SONET and SDH were conceived originally for optical fibre transmission, SDH radio
systems exist at rates compatible with both SONET and SDH.
The synchronous ring structure, with its inherent resilience, is a powerful building block from
which survivable networks can be built:
A typical power system control network has a radial (star) topology, with point-to-point links
connecting a central control station with associated substations. SDH/SONET network
implementations may connect the substations in rings. The logical star connection is achieved
by configuring the channels within the SDH/SONET network in order to provide the required
logical point-to-point links. In case of a path interruption, signal flow may be reversed along the
ring such that communication is sustained.
More about SDH network design and -operation is found in chapter 4.6.2.1 of this document.
74 / 172
PROTECTION USING TELECOMMUNICATIONS
CIGRE JWG 34/35.11
or "jitter" unless paths are re-routed automatically or manually due to network failures. Transmit
and receive directions may however still experience different signal propagation times when the
physical route does not follow the same path. Provisions to accommodate the non-equal signal
transfer times have to be built into the protection relay in this case, see also Chapter 6.3.1.1.
More about the subject on wideband transport technologies and networks can be found in [13]
and [2].
Depending on the geographical extension of the network, it can be classified into three groups:
- Local-Area Network (LAN). The users are geographically close together in the same
building or area.
- Metropolitan-Area Network (MAN). The users are located in a campus or a city that do
not cover a wide extension.
- Wide-Area Network (WAN). The users are located far apart over a region or one or
several countries. Network components are connected by means of communication
equipment. The largest WAN in operation today is the Internet which give service to
hundreds of million users all over the world.
WAN is the more complex type. LAN and MAN are simplifications of the general principles
included in WAN. Therefore, the following introduction to the general concepts of the networks
technologies will be focused on WAN.
Although the main network components are communication equipment and switching nodes,
which are the hardware devices of the network, software components that perform the
algorithms are the elements that define the final service performance.
In order to achieve the best cost performance ratio, and so get a cost-effective approach,
networks are designed following a non-regular architecture. Although there are no general rules
that can apply to the architectural design, as it depends on the geographical distribution of the
users and on the type of services offered by the network, a network can be formed by two main
parts or layers: the transport network and the service network.
75 / 172
PROTECTION USING TELECOMMUNICATIONS
CIGRE JWG 34/35.11
S E R V IC E
ACCESS
P O IN T S
S E R V IC E
LAY ER
TRA NS PO RT
LAY ER
The transport layer takes care of the communication between geographically separated sites
providing the transport service for the telecommunication service network and so connecting the
different parts of the whole service network.
Depending on the geographical distribution, the transport layer could form a mesh of channels
connecting different sites, or be reduced to the actual links that connect the switching nodes of
the service network.
The service layer performs all the necessary functions to offer the final service to the user. It is
formed by switching nodes connected by means of dedicated links or throug channels of the
transport network.
Service networks can be classified according to the technology on which they are implemented.
They can also be classified by the service they provide; nevertheless, this classification has
became obsolete due to fact that modern networks are designed to integrate a wide variety of
services.
Service networks could be structured, depending on the size and geographical distribution, in
access and core networks. The access network connects end-users to the closest core node
whereas the core network performs transit functions in order to set-up a connection between
access nodes thus establishing the final end-to-end connection.
Figure 4.5-2 shows the main components of a complete network. It can be seen that transport
functions are placed in the bottom layer as they provide the basic interconnection functionality
to the upper functions, the networking layer. This layer is formed by a set of functions that are
responsible for the delivering of the final service to the end user.
76 / 172
PROTECTION USING TELECOMMUNICATIONS
CIGRE JWG 34/35.11
NETWORK SERVICES
SIGNALLING
ADDRESSING
NETWORKING
SWITCHING
ROUTING
TRANSPORT
PDH/SDH
PHYSICAL MEDIA
It is important to comment that these components should interact among themselves to offer the
final networking service so that every node of the service network has to be able to support
those functions and work in a collaborating way so that a global performance could be
achieved.
These connections are established from the Management Centre and so cannot be controlled
by the final user. These permanent connections are usually devoted to link nodes of the service
network, though, they can also be used to interconnect any other device when networking
functionality is not required.
Out of the analogue transmission systems, which can form transport networks by means of
analogue transit connections, two main digital transport technologies, PDH and SDH can be
distinguished.
Plesiochronous Digital Hierarchy PDH was the base of the former digital networks. PDH is a
mature technology that has been relegated, in modern networks, to access functions. It is based
on the Time Division Multiplexing TDM technique. This technique divides the capacity of a
77 / 172
PROTECTION USING TELECOMMUNICATIONS
CIGRE JWG 34/35.11
channel in equal shares among its users by assigning a part of the time to every user.
Synchronous Digital Hierarchy SDH is the newest transport technology. It is used for high
capacity transport applications, being the transport technology in which the Broadband ISDN (B-
ISDN) is based. See also chapter 4.4.2.
In 1978, the ISO (International Standards Organization) started the works to define an open
communication architecture. After ten years of works, the OSI (Open System Interconnection)
model was released. The OSI model defines a generic architecture for data communication
networks that due to its global and wide perspective is normally used to explain the operation of
communication networks.
Two types of systems have been defined in the OSI reference model: End-Systems and
Intermediate Systems.
An End-System is a terminal equipment that delivers the final service to the user. An
Intermediate System is a network device, which does not directly support users but forwards
received data towards the final destination. Intermediate systems do not need to understand the
information being sent between the users, but need to understand and possibly modify the
information added by the network to provide the communication.
End Systems may be directly connected, but more normally rely on the service provided by one
or more Intermediate Systems. Examples of intermediate systems are routers or network
switches.
The communications process between End systems and Intermediate systems is usually
defined in terms of the seven layers OSI reference model. In this reference model, shown on
Figure 4.5-3, intermediate systems handle only protocol information at and below the network
layer, whereas end systems use protocols at all the layers of the reference model.
Medium Medium
78 / 172
PROTECTION USING TELECOMMUNICATIONS
CIGRE JWG 34/35.11
Every layer has a well-defined functionality and provides a service to the upper layer in the
model. The functions carried out by every one of the OSI model layers are:
1. Physical layer. The responsibility of the physical layer is to transmit unstructured bits of
information across a link. It deals with the physical aspects such as the shape of connector,
pin assignment, etc.
2. Data link layer. The responsibility of the data link layer is to transmit the information across a
link. It deals with error detection and correction, information alignment and addressing when
several system are reachable as in LANs or multipoint links.
3. Network Layer. The responsibility of the network layer is to enable the communication
between any pair of end system in the network. The network layer deals with the route
calculation function, congestion control, etc.
4. Transport layer. The responsibility of the transport layer is to establish a reliable
communication stream between a pair of End systems. It deals with the detection and
correction of the errors introduced by the network layer, such as packet lost or duplicated,
reordering of out-of-order information, etc.
5. Session layer. The responsibility of the session layer is to co-ordinate the way data are
transferred throughout the communication provided by the transport layer.
6. Presentation layer. The responsibility of the presentation layer is to adapt, when necessary,
the different internal data representation format used by the End system that are transferring
information.
7. Application layer. The responsibility of the application layer is to deliver the communication
service to the application that is using the service provided by the network.
Resources are allocated to a connection whilst this connection is maintained, even though they
were not used. Only when the connection is released will the resources be liberated.
Circuit switched networks can be based on analogue transport technology, on digital transport,
whether PDH or SDH, or on a mixed configuration. Due to the fact that a circuit of constant bit-
rate, usually 64 kbit/s, is used to support the connection, a deterministic delay performance is
achieved in the final service offered. On the other hand, since every connection established in
the network is based on the use of 64 kbit/s channels, when a connection is used for the
transmission of information with a lower bit-rate poor resource efficiency is obtained, unless
sub-multiplexing techniques are applied.
Narrow-Band ISDN is the ITU-T standard for Digital Circuit Switched Networks. Switched and
permanent connections can be established. The integration of services is limited to connection-
oriented constant bit-rate service types.
79 / 172
PROTECTION USING TELECOMMUNICATIONS
CIGRE JWG 34/35.11
This mechanism allows resource optimisation to be achieved at network level but, on the other
hand, a non-deterministic delay is obtained for every virtual connection due to the effect of
statistical multiplexing used in the network.
This type of networks offers packet-oriented services. It is not possible to obtain constant bit-
rate services due to the intrinsic non-deterministic delay of its transmission mode. They are
mainly used to interconnect computers as they offer data communication services.
X.25 and Frame-Relay networks are examples of this type of networks. They provide data
packet communication service primary used for LAN or Mainframe interconnections and data
network implementation.
B-ISDN is a connection-oriented network. Thanks to the use of ATM, any type of service such
as packet-oriented, circuit-oriented, constant bit-rate, variable bit-rate or even connectionless
can be integrated on the same network.
In ATM networks, the information is carried in cells. The cells follow the pre-established path in
the network. Cells are generated depending on the amount of information the user wants to
transmit. Resource optimisation is achieved as cells are generated only when some information
has to be transmitted, so that the network capacity is shared by the users, the total amount of
bandwidth required being lower due to the statistical multiplexing gain.
One of the new concepts introduced by ATM is the flexible bandwidth and QoS service
allocation, (see A3.2). It is possible for every user to set requirements on bandwidth, total End-
to-End delay and delay variation. Thanks to this, connections with fixed bandwidth and bounded
delay and delay variation can be defined in an ATM network. This possibility is used to offer the
Circuit Emulation Service (CES), [14]. The performance of a circuit emulated by an ATM
network is comparable to that experienced with current TDM technology.
CES offers structured DS1/E1 Nx64 kbit/s (Fractional DS1/E1, where a selected subset of the
32 channels from the entire frame are transmitted, i.e. N = 1…32) services as well as
unstructured DS1/E1 (2'048 kbit/s gross data rate, transparent bit-by-bit transmission)
80 / 172
PROTECTION USING TELECOMMUNICATIONS
CIGRE JWG 34/35.11
CBR
Figure 4.5-4 shows the reference model of the CES. We can distinguish three main
components: The Data Terminal Equipment (DTE), the Internet-Working Function (IWF) and the
ATM network. The DTEs are the actual users of the service, a protection relay or a
teleprotection equipment providing 64 kbit/s or N times 64 kbit/s for instance. The IWF provides
the conversion of the bit-stream generated by the users into cells and the reconstruction of the
original bit-stream at the reception side including timing recovery and jitter removal. This
function is usually embedded in the ATM access device. Finally, the ATM network should
provide a Constant Bit-Rate (CBR) virtual channel that should have been dimensioned with the
fixed bandwidth required to carry the bit-stream provided by the users.
When Nx64 kbit/s working mode is selected, cross-connect (DXC, Digital Cross-Connect)
functionality can also be provided, thereby being possible to deliver every single 64 kbit/s
channel to different locations in a similar way as PDH cross-connect devices do.
Since the CES has to offer quality performance similar to a PDH/SDH connection, it has to fulfil
the requirement of the related standards. Therefore, a CES has to comply with ANSI T1.403
and ITU-T G.824 for jitter and wander performance of digital networks that are based on the
1544kbit/s hierarchy, and ITU-T G.823 for networks that are based on the 2048 kbit/s digital
hierarchy, see also Table 4.4-1. Other facilities related with the data format and structure such
as framing, alarm transmission, loops, etc, should comply with the relevant standards already
applied to PDH/SDH connections.
The Bit Error Rate (BER) of the emulated channel should comply with the ITU-T G.826
recommendation for E1 (2048 kbit/s) and the ANSI T1.510-1994 for DS1 (1544 kbit/s), or ITU-T
G.821 for lower bit rates, e.g. 64 kbit/s.
CES could find a direct application to connect existing protection relays or digital teleprotection
equipment to ATM networks without the need of a specific implementation or external
adaptation devices. Nevertheless, no practical experience of using this approach has been
reported until the moment of writing this document.
Datagram networks have introduced a very different mode of operation. Network resources
(bandwidth, buffers, etc.) are statistically shared among their users. This presents many
advantages for computer communication applications, since data traffic tends to be bursty so
that resource reservation would lead to low utilisation levels. In datagram networks, data
81 / 172
PROTECTION USING TELECOMMUNICATIONS
CIGRE JWG 34/35.11
packets are delivered to the Network without any resource allocation, and the network exerts its
“best effort” to serve the packets.
Two different working modes can be distinguished in data networks, “Hop-by-Hop” control, used
in Virtual Circuit Networks and “End-to-End” control used in Datagram Network.
In the first approach, a connection is set up in the network, so that every intermediate system
involved in this connection change its internal state. Every node takes care of every packet and
guarantees its transmission towards its destination. This scheme suffers from a side effect
known as “fate-sharing”: The End-to-End connection depends on the state of all the
intermediate systems involved in this connection. If any of those systems fails, the connection
will be lost.
In the datagram approach, the End-to-End connection does not depend on the state of any one
of the intermediate systems of the network. If one of the intermediate systems fails, the
information will be routed using another path so that the final users will not be aware of this
change. This scheme increases the overall availability of the network with this effect being more
important for bigger networks.
In the End-to-End scheme, the responsibilities are shared between the network and its users.
The Network is responsible for the routing whereas the users are responsible for the control of
the communication. Thanks to this approach, the Datagram networks present an unmatchable
resilience level as well as the best resource optimisation. These characteristics make them
suitable for mission-critical applications such as most of the applications that can be found in
the Power Utility Control Network environment.
Datagram networks using IP (Internet Protocol) cannot assure the QoS as the network presents
a non-deterministic transmission delay. Then it cannot be applied to delay sensitive applications
such as teleprotection, unless some specific Quality of Service mechanisms were added in
order to guarantee bandwidth and/or delay. Refer to chapter A3.3 in ANNEX A3.
The great flexibility of this type of networks makes them suitable for service integration.
Although they cannot intrinsically offer a constant bit-rate service, thanks to a new application
protocol that has been defined (Real-time protocol) it is possible to eliminate the delay variation
at the application level. However this comes at the expense of an additional delay that may not
be acceptable for protection.
In summary, a LAN is a communication network that can be characterised by the following facts:
82 / 172
PROTECTION USING TELECOMMUNICATIONS
CIGRE JWG 34/35.11
- Topology: The way network devices are connected. Straight-line bus, ring, and star are
the most common arrangements.
- Protocols and media contention: The rules and encoding specifications for data
interchange and for the administration of the shared medium.
- Physical media: Devices can be connected by twisted-pair cable, coaxial cable, fibre or
wireless.
4.5.3.1 Topology
As shown in Figure 4.5-5, there are three basic topologies used in LANs:
- Bus topology. All devices are connected to a central cable, called the bus or backbone.
Bus networks are relatively inexpensive and easy to install for small networks.
- Ring topology. All devices are connected to one another in the shape of a closed loop,
so that each device is connected directly to two other devices, one on either side of it.
Ring topologies are relatively expensive and difficult to install and maintain, but they
offer higher bandwidth than bus topology and can span large distances.
- Star Topology. All devices are connected to a central hub. Star networks are relatively
easy to install and manage, but bottlenecks can occur because all data must pass
through the hub.
S ta r
R in g
B us
The market trend in terms of topology is going towards the star topology since both hubs and
switches have enough capacity to cope with all the traffic that can be generated in a LAN. Star
topology has been adopted to support internal substation communication in the new UCA
architecture.
Bus topology is a cost-effective solution for small LANs but due to the fact that is less reliable
than star topology, it is not recommended for substation applications.
Although ring topology is conceptually the best approach, its lack of flexibility and scalability has
put it aside of the main innovative applications though still maintains a considerable market
83 / 172
PROTECTION USING TELECOMMUNICATIONS
CIGRE JWG 34/35.11
share.
In a token scheme, a user can send a piece of information when it has the token. The token is
circulated from user to user.
In a contention scheme, every user can send at will when it sees the channel in idle condition.
When two or more users transmit at the same time a “collision” occurs. This situation is resolved
by means of contention mechanisms that have a probabilistically fair behavior.
The CSMA/CD (Carrier Sense Multiple Access with Collision Detection) working principle which
is used by the Ethernet LANs has proved to be the most efficient and flexible contention
scheme able to adapt to different speeds and physical media.
Every different aspect of LAN networks, from physical specifications to protocols, has been
developed by the IEEE 802 committee and later adopted by international standardization
bodies. Protocols involved in the data interchange in LANs are confined to the OSI data link
layer. Figure 4.5-6 shows the protocol stack of the Ethernet LAN and its relation with the OSI 7
layers reference model. The 100 Mbit/s Ethernet protocol stack has been shown since this is the
standard adopted for the internal substation communication.
OSI IEEE
7- Layer CSMA/CD
reference Model
Model
Application
Higher Layers
Presentation
Logical Link Control
Session LLC
Media Access Control
Transport MAC
RS
Network
Media Independent
Data Link Interface MII
Physical
Physical Media
100 Mbit/s
84 / 172
PROTECTION USING TELECOMMUNICATIONS
CIGRE JWG 34/35.11
- 100BASE-TX that uses a 2 pairs UTP (Unshielded Twisted Pairs) category 5 cable in a
point-to-point arrangement (Star topology)
- 100BASE-FX that uses an optical fibre (2 strands) in a point-to-point arrangement (Star
topology)
Due to this, it is very appealing to extend its range of application. Nevertheless, this is not
always possible since LANs have also certain limitations:
- The number of users that can be connected in a LAN segment is limited.
- The geographical expansion of a LAN is limited.
- The amount of traffic that can be carried is limited.
To overcome these limitations, devices like repeaters, bridges and Ethernet switches have been
designed. They allow several LANs to be interconnected thereby becoming a single LAN from
the point of view of the users without the above mentioned limitations.
The typical functionality of the devices that allow LAN topology expansion is:
85 / 172
PROTECTION USING TELECOMMUNICATIONS
CIGRE JWG 34/35.11
that is to say, a group of users connected in any physical LAN segment can be logically
associated so that they work as if they were connected in a single LAN segment with
broadcast functionality. Between different Virtual LAN segments attached to the same
device, bridging functionality is provided.
Most of the off-the-shelf LAN access/control devices include Hub, Bridging and Switching
functions. These devices allow the network manager to define several virtual LANs that share
the same physical infrastructure and set when hub-, bridging- or switching functions have to be
used in order to optimize the LAN performance. When the LAN serves a site of a Wide Area
Network, routing functionality can also be included in most of these devices, being then possible
to forward packets to any other site of the same Wide Area Network.
4.6.1 Introduction
Protection devices that operate over the same power line or subsystem require communication
to improve their protection capabilities. The telecommunication service supporting protection
communication should comply with a set of tough requirements.
The main requirements that are considered in the definition of a Telecommunication service for
Protection can be expressed with three concepts: Transmission time, Dependability and
Security.
Transmission time is the time required by a signal to propagate along the path that provides
communication between the protection devices. This delay corresponds to the addition of the
delays introduced by every component of the path, that is, the propagation delay of every link
involved in the path and the transit delay of every cross-connect or switch that establish the
communication path. Refer also to ANNEX A1, Figure A1-5.
IEC 60834-1 states that the propagation delay introduced by the communication circuit should
be less than 5 milliseconds, see Figure A1-5 in ANNEX A1. This delay is the addition of the
delays introduced by every link or node involved in the communication path. It should be
highlighted that those networks that introduce a variable delay in the information, such as IP
datagram or ATM networks, should be engineered to assure the maximum delay instead of the
typical engineering approach that works with the mean delay of the information.
In order to design the network architecture, any possible communication path used to transport
protection information should be analysed in order to verify if it complies with the End-to-End
delay required by the protection scheme that is going to use this path.
Some protection schemes, such as Differential Current Protection, require a symmetrical delay
for the go- and return direction in the communication path. This requirement should be
considered in the design of the network in order to avoid the use of asymmetrical paths as they
present different propagation delay in each direction.
Security performance of a protection scheme is generally related to the Bit Error Rate (BER) of
the channel that communicates the protection systems. It is assumed that the design of the links
used for any type of application is carried out in accordance to the ITU-T recommendations and
so the expected performance in terms of BER will be always in the working limits under normal
operating conditions.
Dependability is related to the BER and the signal propagation delay of the channel. Assuming
86 / 172
PROTECTION USING TELECOMMUNICATIONS
CIGRE JWG 34/35.11
that the digital path supporting the protection communication complies with the ITU-T standards
for the Quality of Service of digital connections the dependability will depend on the
performance of the protocol used by the protection communication device (i.e. teleprotection
function).
Availability of a communication path can be defined as the ability of this path to perform its
required function at any instant of time within a given time interval, assuming that the external
resources, if required, are provided. It can be expressed as:
MUT
A=
MDT + MUT
Where MDT is the Mean Down Time and MUT is the Mean Up Time.
In general, it is widely accepted that the availability objective for a Telecommunication Service
for protection should reach the 99,99%. This availability level, as can be seen from the above-
mentioned expression, is quite difficult to achieve with a single link so that a back-up link should
be considered.
When a network implements the communication path, other protection measures can be
included in order to improve the availability of the service without devoting several links for
every protection device. Among these protection measures such as recovery or self-healing
mechanisms are the more relevant issues to be considered. When these protection procedures
are implemented in a network, other functional components such as routing and addressing
should also be analyzed in order to prevent collateral effects that could affect the protection
service performance.
Out of the above mentioned concepts directly related with the protection service, there are other
requirements at the network level that should also be studied as they can influence the
protection service operation.
Service isolation and service prioritization facility is another important issue to be considered
in the design of a network for protection communication:
Modern digital networks are used to integrate different types of services. This is a common
practice in transport networks as the aggregation of different traffic services allows a more
efficient use of high capacity links such as fibre-optic cables or microwave radio links.
Integration of services implies that different users are sharing the network resources. Under
these conditions, the network should provide mechanisms in order to guarantee the isolation
among different users. By providing this, every user has a guarantee of use of their assigned
resources and so it can expect a guaranteed level of availability.
On the other hand, networks integrating mission-critical services should provide a priority
mechanism that allows the implementation of different availability levels. The priority mechanism
should guarantee that in case of lack of resources due to an outage situation or network
congestion, the service with a higher priority will always be able to use the remaining network
resources and so maintain the expected service availability.
Network Security is a very important aspect to be considered in the design of a network that
offers communication service to protection applications:
Network Security includes different aspects that all together provide the necessary means for
87 / 172
PROTECTION USING TELECOMMUNICATIONS
CIGRE JWG 34/35.11
secure and reliable operation of the network. The goal of the security functions is to assure that
any other user of the network cannot interfere with, by any means, the proper operation of the
protection system. That is to say, the network should withstand any security attack coming from
any other user of the network whether on purpose or by mistake.
The security aspects of the Network Management Centre are standardized by the ITU-T and the
ISO. The operational details are discussed later in this chapter.
Both technologies are based on the Time Division Multiplexing technique, see 4.4.1.2. Thanks
to this, they present a deterministic and relatively low transmission delay. Apart from changing
signal transfer delays due to route switching, their use for most of the protection schemes do not
pose any problem as the transmission delay is low in comparison with most of the protection
requirements.
The use of a fixed connection established over a PDH or SDH network for the communication of
two protection devices does not present any type of drawback as the incremental delay
compared with a direct link is very low. On the other hand, as we have seen before, in order to
achieve the availability level requested for this type of service we have to implement some type
of recovery mechanism in the network that allows the use of an alternative path when the main
path fails. See also 4.4.2.2 on network resilience of SDH networks.
The BER of a digital connection established in a PDH/SDH network is normally very low and so
it will not have any effect on the Security and Dependability of the protection scheme that uses
this path. Nevertheless, the quality of the path can be affected by the synchronization of the
network or may be adversely affected by a power system fault due to EMI (Electromagnetic
Interference).
The implementation of a good network synchronization plan is very important to achieve the
transmission quality levels expected in this type of networks. A poor synchronization scheme
will lead to signal slips that produce error bursts that increment the BER of the digital path
leading to a poor transmission quality or loss of signal. This effect can disturb the proper
protection scheme operation. It can be relevant for Current Differential Protection schemes
88 / 172
PROTECTION USING TELECOMMUNICATIONS
CIGRE JWG 34/35.11
SDH transport networks uses a pointer mechanism to indicate the phase of the information
inside the main information frame. Changes in phase leads to pointer adjustments that if
mishandled can produce sudden phase changes in the transported signals that have a similar
effect to the above mentioned slips.
Recovery mechanisms in SDH network are fully standardised. There are two basic mechanisms
that could be applied to improve the overall availability of the transport Network, the Multiplexer
Section Protection and the Path Protection.
Multiplexer Section Protection is a straightforward method that protects the connection between
two nodes by adding back-up links. In order to achieve a full coverage in the protection both
links should use physically diverse routes.
Path Protection Mechanism protects the End-to-End connection of the final users over the
transport network. This method has proved to be very efficient in small ring configurations, but it
presents a serious drawback for certain types of protection schemes such as Current
Differential due to the fact that the back-up path can be configured with an asymmetrical layout
that leads to an asymmetrical delay. This effect together with a possible sudden change in delay
due to a different back-up path length will drive to erroneous protection actuation.
Both methods present a poor bandwidth utilisation as the amount of traffic that should be
protected requires the same back-up capacity reserved in the network even though not all of
them will fail at the same time.
PDH/SDH presents intrinsic service isolation and security. Due to the fact that these networks
are based on the TDM technique and no signalling is available in a transport network, it is not
possible for a user to attack another connection. The only point in which security measures
should be considered is in the Control Centre.
89 / 172
PROTECTION USING TELECOMMUNICATIONS
CIGRE JWG 34/35.11
The BER in an ATM link depends only on the characteristics of the physical media used as no
error detection or correction techniques are applied to the user data ( = payload). Nevertheless,
the BER could be considered as negligible due to the wide use of highly reliable links, mainly
based on fibre-optics.
However, the BER experienced by the protection service will be affected by the Cell Loss Rate
CLR (a QoS parameter, see A3.2 in ANNEX A1), which depends on the scheduling, and Call
Admission Control (CAC) algorithms used in the network.
The use of ATM networks to communicate protection devices requires a careful analysis of the
End-to-End delay of the service. The performance of an ATM connection in terms of delay
depends on the cell scheduling policy in the switches as well as on the Call Admission Control
algorithms implemented in the network. It is important to find out if the scheduling algorithms of
the switches are able to isolate protection information from the rest of the traffic of the network,
so that the possible interference among different traffic flows that could drive to an uncontrolled
End-to-End delay can be prevented.
Network topology should be designed taking into account the availability of low-delay
communication paths between protection devices. Routing algorithms should also be analyzed
in order to find out if they implement QoS routing. This facility is a necessary piece to guarantee
an End-to-End bounded delay.
The availability of the protection communication service can be improved if the network
implements some recovery mechanism that can use the spare capacity of the network.
Recovery mechanisms are under standardization process in the ATM-Forum. The great
advantage of ATM networks is that they can choose the back-up route in function of the QoS
requested by the service user. Thanks to this, the back-up path will always comply with the
requested End-to-End delay. The design of the network should take into account that in order to
protect the communication path used by the protection service the network must have some
spare capacity, and the topology design must include some physically disjointed routes with low
transmission delay.
Synchronization is not a critical issue in ATM networks. As they work in asynchronous mode,
the synchronization is carried out at link level and no synchronization plan is needed for the
whole ATM network. Nevertheless, the transport of Constant Bit Rate (CBR) signals and the
interconnection of PDH/SDH network throughout ATM network using the Circuit Emulation
Service (CES) requires a clock synchronization plan to be deployed.
Due to the fact that ATM networks are based on statistical multiplexing, the emulation of a
transmission circuit will require the following aspects to be taken into account:
The two former requirements are achieved by the proper ATM service specification whereas the
last one is not under the control of the ATM network.
Jitter and wander reduction as well as clocking facilities will have to be provided by the Inter-
Networking Function (IWF), see Figure 4.5-4.
90 / 172
PROTECTION USING TELECOMMUNICATIONS
CIGRE JWG 34/35.11
Since the ATM network cannot transmit timing information suitable for network synchronization,
the IWF has to include the clock recovery functions. There are two methods to recover clock
information: the Synchronous Residual Time Stamp (SRTP) and the Adaptive Clock.
SRTP requires a common reference clock to be available at every access point of the ATM
network providing a transport service, whereas the adaptive method does not require any
external clock. Due to this fact, some wander may be introduced by the adaptive method
thereby not being recommended to use it in emulation of circuits that support the
communication of analog comparison protection devices.
The ATM Forum and the ITU-T have standardized this service. In the network design phase, the
synchronization plan should be carefully analyzed; taken into account that ATM network should
not be used to transport timing references and therefore, a network-wide reference clock will
have to be provided.
ATM networks present intrinsic service isolation. Every different service integrated in an ATM
network is based on a Virtual network; this network is formed by a set of Virtual Paths (VP).
Cells belonging to a VP cannot be delivered by any means to another VP.
Flow isolation in the same virtual network is also an intrinsic characteristic of ATM networks.
Cells belonging to a due flow are identified by a particular Virtual Connection Identifier. These
cells cannot be delivered by any means to another connection.
Security aspects in ATM networks should be considered in the design phase in order to
guaranteed the integrity of the Protection information transported by the network. Despite the
tremendous complexity involved, the signalling network can be used to perform a malicious
attack disturbing the proper operation of any service if no counterpart measures are
implemented. The ATM Forum is defining a common framework of security in ATM networks.
This work will produce a set of standards that will improve the security and offer robust
protection to any external security attacks.
4.6.2.3 IP Networks
IP networks are packet switched networks that work in Datagram mode. The End-to-End
connection does not depend on the state of any one of the intermediate systems of the network.
If one of the intermediate systems fail, the information will be routed using another path so that
the final users will not be aware of this change. This scheme dramatically increases the overall
availability of the network, however at the expense of a non-deterministic delay.
Due to the fact that IP networks are based on statistical multiplexing and network access
techniques, they present a non-deterministic delay.
The quality of service, in terms of delay and packet loss, depends not only on the network
working principles but also on the offered traffic load. In the actual network implementations, the
End-to-End delay is not guaranteed. Nevertheless, if the network has been properly engineered
and includes a priority scheme, the delay experienced by the information with higher priority can
be limited to an acceptable value. In this way, the protection information flow is isolated from the
91 / 172
PROTECTION USING TELECOMMUNICATIONS
CIGRE JWG 34/35.11
The IETF (Internet Engineering Task Force, an international institution developing standards for
the internet) is working on the standardization of a new signaling protocol - RSVP - that will
allow the implementation of real-time services over IP networks. This new facility will open the
possibility of offering services with guaranteed End-to-End bounded delays.
IP networks present an intrinsic survivability. As far as a path exist between the users the
communication will be maintained. There is no need for any specific recovery mechanism but
the network should be designed with some spare capacity in order to maintain all the services in
operation in the event of an outage situation.
IP networks do not provide any type of synchronization of the flows that are being transported.
Applications that require this functionality should use specific synchronization protocols such as
Real-Time Protocol (RTP) that is embedded into the application and provides the timing
recovery functionality. The application of such type of protocols for delay sensitive protection
schemes should be very carefully analyzed in order to find out if the resolution and precision of
this type of protocols fulfil the operational requirement of this type of protection scheme.
An IP network presents intrinsic service isolation. In general, every application that uses the
network services, such as protection, is associated to a port number of an IP address. The IP
address range could identify the service whereas the port number identifies the flow. If the
addressing scheme of the private IP network has been properly defined and static IP address
allocation is implemented every service is unequivocally identified by a fixed IP address range.
In this situation, there is little risk that information belonging to a due application could be
delivered to another application in the network.
IP networks present an intrinsic network security due to its working mode. In a Datagram
network, it is not possible for a user to know the physical path that will be used by the
information. In fact, every datagram can follow a different path in the network so no specific
measures are needed to prevent security attacks at network level.
Although the network is intrinsically secure, the applications using the network are not protected
at all. It should be analyzed if some security measures have to be taken into account in the
network design to protect certain types of critical applications such as the one that supports
protection service.
92 / 172
PROTECTION USING TELECOMMUNICATIONS
CIGRE JWG 34/35.11
5 TELEPROTECTION INTERFACES
Four types of interfaces are commonly used for protection relaying:
- Contact based interfaces
- Analogue interfaces
- Electrical serial data interfaces
- Optical fibre interfaces
In the near future, Ethernet interfaces will likely be introduced. not only for intra-station
communication using LANs, but also for inter-station communication across a WAN.
The type of interface depends strongly on whether the teleprotection device is a separate
equipment or whether it is an integrated function of the protection relay. Little has been done in
the standardization area in respect of surge protection of copper-based Ethernet/LAN circuits
that operate in the electromagnetic hostile environment of power stations and substations, as
this technology has mainly been deployed in the office environment.
EMC and insulation requirements for contact interfaces are found in [27].
93 / 172
PROTECTION USING TELECOMMUNICATIONS
CIGRE JWG 34/35.11
Commonly used interface types are shown in Table 5.3-1. An in-depth treatment of these
interfaces regarding their application to protection is found in [2]. With the exception of the
G.703 interface, serial interfaces are normally not electrically isolated from ground or from each
other in case of multiple interface circuits. A special design to provide electrical isolation from
ground and between interface circuits may be requested, as these circuits are installed in the
electromagnetic hostile environment of power stations and substations with inherent risks of
ground loops and strong EMI, in particular during fault incidents.
94 / 172
PROTECTION USING TELECOMMUNICATIONS
CIGRE JWG 34/35.11
asynchronous
Not part of the
standard;
RS 422a
V.11 up to 38.4kbit/s Electrical isolation
requires special
design
Not part of the
standard;
------ RS 485 up to 38.4kbit/s Electrical isolation
requires special
design
Not part of the
standard;
------ RS232c/d/e up to 38.4kbit/s Electrical isolation
requires special
design
Not part of the
up to 64kbit/s
standard;
synchronous
RS 422a or
V.11/X.24 Electrical isolation
n*64kbit/s
requires special
(n=1...32)
design
Not part of the
up to 64kbit/s
standard;
or
RS 485 Electrical isolation
n*64kbit/s
requires special
(n=1...32)
design
G.703 n*64kbit/s;
----- yes
co-directional n=1…32
95 / 172
PROTECTION USING TELECOMMUNICATIONS
CIGRE JWG 34/35.11
to find suitable methods of providing noise immune methods of interconnecting services and
providing power supplies to the interface converter units within the substation environment.
Many electro-optical converters and DC power filters are available and offer advanced solutions
to the well-known problems experienced by protection and telecommunication engineers. The
majority of the units are proprietary and are only compliant when used in conjunction with the
approved proprietary protection solutions.
It is essential that the convergence of Substation control and Protection philosophies address
the need to have common international standards for protocols and interfaces to meet the
needs of standard substation network build.
Although there are several LAN technologies as explained in Chapter 4.5.3, Ethernet is
predominantly being used in the substation environment. Ethernet, which was developed in the
1970s, was the technological basis for IEEE 802.3 specification, which was initially released in
1980. The differences between Ethernet and IEEE 802.3 LANs are subtle. Ethernet provides
services corresponding to Layers 1 and 2 of the OSI reference model (see Figure 4.5-3 and
Figure 4.5-6), while IEEE 802.3 specifies Layer 1 and the Medium Access (MAC) portion of the
Data Link Layer (Layer 2), but does not define a logical link control protocol (LLC). Today, the
term "Ethernet" is often used to refer to all carrier sense multiple access/collision detection
(CSMA/CD) LANs that generally conform to Ethernet specifications, including IEEE 802.3.
The following paragraphs and Table 5.3-2 depict the most common physical interfaces used to
implement LAN in substations.
96 / 172
PROTECTION USING TELECOMMUNICATIONS
CIGRE JWG 34/35.11
topology and requires the use of a Hub equipped with a port for every device connected to the
LAN. The length of the cable from the attached device to the Hub can range up to 100 m.
Due to non-compliance with EMC requirements and test severity levels that have been
developed for protection relay I/O circuits, like the Fast Transient Test for example, the 10BaseT
interface should only be used with care for protection relaying, or when EMC requirements have
been agreed between user and manufacturer.
97 / 172
PROTECTION USING TELECOMMUNICATIONS
CIGRE JWG 34/35.11
IEEE802.3
Ethernet
10Base2 10BaseT 10BaseFL 100BaseTX 100BaseFX
Data rate
10 10 10 10 100 100
(Mbit/s)
100
Max. segment
500 185 100 100 (UTP category 100
length (m)
5 cable)
Unshielded Unshielded
50-Ohm coax 50-Ohm coax Optical fibre Optical fibre
Medium twisted-pair twisted-pair
(thick) (thin) pair pair
wire wire
Topology Bus Bus Star / Hub Star /Hub Star / Hub Star / Hub
Warning:
LANs with Bus/Star/Hub topologies exhibit the risk of "single point-of -failures", unless
appropriate precautions like redundant LANs or some other form of protection against single
point-of-failures are implemented.
98 / 172
PROTECTION USING TELECOMMUNICATIONS
CIGRE JWG 34/35.11
6.1.1 Introduction
When setting up performance requirements, it is important to relate the same to a defined
reference point or interface. The boundary between protection, teleprotection and
telecommunication is not always well understood, particularly when some of the functions (e.g.,
teleprotection) are integrated into the protection relay or into the telecommunication terminal
equipment. It is therefore important that a common understanding be achieved. The figures in
ANNEX A1 should facilitate this.
The arrangement of teleprotection schemes and their various interfaces will depend on whether
the teleprotection is an integrated part of or separate from the protection equipment. The
principal interfaces are referred to in Figures A1-1 to A1-4 in ANNEX A1.
In an integrated arrangement the interface between the protection equipment and the
teleprotection equipment will invariably be within the same equipment case or cubicle.
Furthermore, the two parts will have been designed as one, so that interface levels, impedance
matching etc. and other specialized requirements will be a function of the design and not a
function of the external environment. As a result of this internal interface some of the
requirements stated in this document will not apply to this category of equipment. However, the
requirements of the interface between the telecommunication system and the teleprotection
equipment / -function will, in most instances, still be applicable.
In the separated arrangement, the teleprotection will most likely be physically divorced from the
protection equipment , and, since it will not have been designed as a complete unit, all the
requirements in this document apply.
Correspondingly, the teleprotection equipment and the telecommunication equipment may form
an integrated arrangement. In this case some of the requirements concerning interface (a) in
Figures A1-1 to A1-5 (ANNEX A1) are still applicable.
Other interfaces, not shown in the Figure in ANNEX A1, exist between the sensors (current and
voltage transformers) and the protection equipment, as well as between the protection
equipment and the tripping circuit of the breaker. Since the requirements in this paragraph apply
mainly to the telecommunication and teleprotection functions, performance requirements
associated with these interfaces are not defined. However, when overall performance has to be
evaluated, it may be necessary to set up or simulate the power frequency quantities in a
suitable test environment.
Table 6.1-1 and Table 6.1-2 summarize basic requirements from protection and may serve as a
guideline for assessing teleprotection systems. Particular systems are then dealt with in more
detail in the following paragraphs. Obviously, requirements are different depending on which
interface (a) or (b) in ANNEX A1 is considered.
Actual requirements depend on many factors, such as line voltage level, protection system
design, utility practice, degree of redundancy, power grid stability, etc. It is therefore neither
possible nor practical to establish fixed requirements that would cover all cases. The figures in
99 / 172
PROTECTION USING TELECOMMUNICATIONS
CIGRE JWG 34/35.11
Table 6.1-1 and Table 6.1-2 merely permit the comparison of various systems and highlight
some critical issues that need to be addressed when designing a protection system using
telecommunications.
The requirements in Table 6.1-1 and Table 6.1-2 focus on digital systems. In numerical relays,
the teleprotection equipment - which caters for the data integrity - may be integrated as a
function into the protection relay. This is mainly the case for analog comparison protection
relays. Interface (a) is then not directly accessible for the user since it is relay internal. Thus,
interface (b) in Figures A1-1 to A1-5 in ANNEX A1 is of particular interest in the context of this
document. Requirements for the more traditional interface (a) are also given in the table, as
these are relevant for dedicated teleprotection equipment, or when the teleprotection function is
integrated into the telecommunication terminal equipment. Where possible, references to
existing standards are made.
Propagation time
Signal propagation time across a telecommunication network is one of the most critical
parameters, as it should be kept to a minimum to ensure that a circuit can be tripped as quickly
as possible. Protection may therefore specify a maximum acceptable value measured at
reference point (b), see the figures in ANNEX A1. Validation of the actual value may be
performed for each link as part of the commissioning tests. The delay should also be measured
with the circuit manually switched to its alternate route(s).
100 / 172
PROTECTION USING TELECOMMUNICATIONS
CIGRE JWG 34/35.11
Availability
Availability figures are not explicitly included in Table 6.1-1 and Table 6.1-2, as the definition of
availability (or available time) according to ITU-T G.821 has little relevance for protection, or at
least needs a closer examination.
As defined in ITU-T G.821, a period of unavailable time begins when the bit error rate in each
second exceeds 10-3 for ten consecutive seconds and terminates when the bit error rate in each
second drops below 10-3 for ten consecutive seconds.
Whilst a period of ten or more seconds during which a communication link is unavailable may be
acceptable for non time-sensitive data or voice communication as messages may be repeated,
it is not accepted for protection, because protection operation represents an emergency case
where communication has to be unconditionally available. High-end protection systems are
therefore normally designed as redundant systems. Nevertheless, the definition according to
ITU-T G.821 suggests that a teleprotection system should remain operational up to bit error
rates of 10-3, although performance may start to degrade at error rates that exceed 10-5.
Re-routing
Re-routing - and in particular automatic re-routing - is a salient feature of modern
communication networks. It requires however special consideration if this function is applied to
protection channels.
For example, it is recommended that the BER and the delay at which a telecom network initiates
a changeover be co-ordinated with the teleprotection dependability characteristic. There may be
an unacceptable break in service of typically some tens of milliseconds if changeover is initiated
due to a disturbed channel that is coincident with a power system fault. In many cases, there
would be a good chance of signaling over the disturbed channel and successfully tripping the
circuit, if a hasty route switching can be inhibited.
As there is a real possibility - for example when re-routing is based on an equal delay or least
cost strategy - that automatic re-routing could end up in transporting both Main 1 and Main 2
protection over the same bearer (e.g. same fibre cable or same radio link), special measures
have to be taken to ensure that this eventuality cannot arise, e.g. by pre-defining two paths
(main and alternate) with appropriate diversity and known signal transfer delays.
Data integrity
Although a telecommunication system is designed to produce low error rates (< 10-6) under
normal operating conditions (measured at interface (b) in ANNEX A1), there may always be
certain exceptional conditions that produce excessive error rates. Examples are fading
microwave links, link failures, synchronization failures, bit slips or equipment defects. Error rates
may then accept any value up to 50% before the corrupt data is eventually blocked by the
telecommunication system. This requires that an error detection system be included in the
teleprotection receive function in order to keep the residual error rate sufficiently low to prevent
maloperation of the protection. Formats and protocols in accordance with IEC 60870-5-1 may
be used.
101 / 172
PROTECTION USING TELECOMMUNICATIONS
CIGRE JWG 34/35.11
Channel squelching
Although communication protocols for protection signal transmission (= teleprotection protocols)
usually provide a high resilience against transmission errors, it is advisable that
telecommunication receive circuits are muted or clamped to a predefined state (normally "all
ones") when the error rate becomes excessive for an extended period. High error rates of up to
50% may for example be found in conjunction with a link failure, or data may be inverted due to
an equipment failure. Data muting or clamping may be accomplished at the receive side of
interfaces (b) or (a) in Figures A1-1 to A1-4 in ANNEX A1.
Synchronization
When analogue voice-frequency (VF) bearer services or asynchronous digital circuits are used,
synchronization of network with the teleprotection signaling devices is not fundamental to the
effective operation of the service.
When synchronous digital services are required the need for secure and stable synchronization
is imperative.
In most configurations the teleprotection signaling device is provided as a Data Terminating
Equipment (DTE). For the majority of schemes the bearer network is controlled from a master
clock source, and all DTEs slave the timing from the master. On few other applications the
DTEs may be required to take on the role of “master clock”.
As the number of digital teleprotection bearer services increase, the need to ensure that the
network providing the connectivity for these services is part of a well defined and secure
synchronized network, becomes an essential part of the power utilities strategy.
It is important that the telecommunications engineer and the protection engineer have a clear
understanding of their equipment and its needs. Too often the service fails due to a lack of clear
and knowledgeable decisions made at the interface.
The difficulties likely to be encountered by synchronization problems are well documented in
[30]. This document should be considered as essential reading as part of this report.
102 / 172
PROTECTION USING TELECOMMUNICATIONS
CIGRE JWG 34/35.11
6.1.1.2 Definitions
The following definitions are related to Table 6.1-1, Table 6.1-2 and the Figures in ANNEX A1.
More terms are explained in Chapter 6.1.1.1.
Teleprotection system
System composed of teleprotection equipment and an associated telecommunication system
between the ends of a protected circuit (IEC 60834-1, [27])
Propagation time
The time elapsed between the instant of application to a telecommunication system (link,
network), under stated conditions, of a specific value of the transmitted signal and the instant
when the received signal assumes the corresponding value at the input of the teleprotection
receiver (Signal transfer delay between interfaces (b) to (b) in Figures A1-1 to A1-5).
103 / 172
PROTECTION USING TELECOMMUNICATIONS
CIGRE JWG 34/35.11
Propagation time may be measured and quoted if interfaces (b) in Figures A1-1 to A1-4 are
accessible.
Transmission time
The transmission time of a teleprotection system is the time elapsed between the instant of
change of state at the teleprotection transmit input and the instant of the corresponding change
of state at the teleprotection receive output (Interfaces (a) in Figures A1-1 to A1-4), excluding
propagation time. ([27], [28]).
The nominal transmission time T0 is the transmission time measured under disturbance-
free transmission conditions.
The maximum actual transmission time Tac is the maximum transmission time
encountered under disturbed transmission conditions for a defined dependability and
signal-to-noise ratio (SNR) or bit error rate (BER).
Transmission time (T0, Tac) and teleprotection operating time (TA) may be measured and quoted
if interfaces (a) in Figures A1-1 to A1-5 are accessible.
Bandwidth
Analogue systems: The width of the frequency range used by the communication channel,
expressed in Hertz (Hz).
Digital systems: Sometimes used as a synonym for data rate.
Data rate
A measure for the information per unit time transferred across a certain reference point /
interface of a system, including any overhead. Normally expressed in bits per second.
Dependability
Dependability relates to the ability to issue and receive a valid signal (command or message) in
due time in the presence of interference and/or noise when a corresponding signal has been
transmitted [27], [28].1
For practical reasons the probability of a missing signal is normally measured. The reference
1
Dependability as defined for teleprotection does not necessarily have the same meaning to the operation of the scheme. For
example with blocking schemes, a missing blocking command is likely to occur in the presence of an external fault condition and
may cause unwanted tripping (=> lack of security of the protection scheme).
104 / 172
PROTECTION USING TELECOMMUNICATIONS
CIGRE JWG 34/35.11
point for the measurement is interface (a) in Figures A1-1 to A1-5 (ANNEX A1).
A poor dependability gives rise to a failure to trip or a delayed trip in an intertripping (direct
tripping) or permissive tripping scheme. A poor dependability in a analog comparison protection
scheme may give rise to a failure to trip or a delayed trip, or may produce unwanted tripping.
Security
Security relates to the ability to prevent interference and noise from generating an unwanted
signal (command or message) at the receiving end when no corresponding signal has been
transmitted, [27], [28].1
For practical reasons the probability of an unwanted signal is normally measured. The reference
point for the measurement is interface (a) in Figures A1-1 to A1-5 (ANNEX A1).
With permissive tripping schemes, the risk of an unwanted tripping action due to inadequate
security of the teleprotection function is generally low, while in intertripping (direct tripping)
schemes each unwanted command will lead to an unwanted tripping action. A poor security in
an analog comparison protection scheme will typically produce unwanted tripping.
Data integrity
Data integrity relates to the probability that received data - that have passed certain error
detecting and/or error correcting procedures - are correct. Data integrity can be expressed as
residual error probability and may be categorized in classes, where each class is characterized
by its upper bound of residual error rates (IEC 60870-5-1). Data integrity is improved by using
protocols that detect, reject or discard data that have been corrupted due to bit errors
introduced by the telecommunication channel.
1
Security as defined for teleprotection does not necessarily have the same meaning to the operation of the scheme. For example
with blocking schemes, an unwanted command may lead, depending upon its duration, either to a delayed trip or to a failure to trip
(=> lack of dependability of the protection scheme).
105 / 172
Interface (b) to (b) in Fig. A1-1 to A1-5 Interface (a) to (a) in Fig. A1-1 to A1-5 General
Recovery
Propagation Bandwidth Overall Impact of misconnection; Time (non-
Propagation Propagation Bit Error Rate 1; 2 1, 3
Time or Operating Time Dependability Security Data Integrity Need for terminal redundant
Time Time Variation (BER)
Symmetry Data Rate 1 TA 1 addressing systems) and
Availability
Misconnection critical when
Low 4
Critical; present during fault
Blocking < 10-5 normal;
Not critical to Depending on Low to Medium; occurrence. Risk of non-
Overreach Critical; Analog: < 10-4 during High;
the operation of Not required co-ordination medium; IEC 60870-2-1 selective tripping.
Distance (< 10ms) < 3kHz power system IEC 60834-1
the scheme times IEC 60834-1 Class I2 Address validation time less
Protection Digital: fault
(< 25ms) critical, since system
< 10kbit/s
normally in guard state
Misconnection critical when
Low 4
present during fault
Permissive < 10-5 normal;
Not critical to Medium; occurrence. Risk of delayed
Underreach Critical; Analog: < 10-4 during Critical; Medium to high; Medium;
the operation of Not required IEC 60870-2-1 tripping.
Distance (< 10ms) < 3kHz power system (< 25.. 30ms) IEC 60834-1 IEC 60834-1
the scheme Class I2 Address validation time less
Protection Digital: fault
critical, since system
< 10kbit/s
normally in guard state
Misconnection critical when
Low 4
present during fault
Permissive < 10-5 normal;
Not critical to Medium to Medium; occurrence. Risk of delayed
Overreach Critical; Analog: < 10-4 during Critical; High;
the operation of Not required high; IEC 60870-2-1 tripping.
Distance (< 10ms) < 3kHz power system (< 25.. 30ms) IEC 60834-1
the scheme IEC 60834-1 Class I2 Address validation time less
Protection Digital: fault
critical, since system
< 10kbit/s
normally in guard state
Misconnection critical when
Low 4
present during fault
Accelerated < 10-5 normal;
Not critical to Medium; occurrence. Risk of missed
Underreach Critical; Analog: < 10-4 during Critical; High; Medium;
the operation of Not required IEC 60870-2-1 tripping.
Table 6.1-1: Requirements from protection on telecommunication and teleprotection: State Comparison Schemes.
For terms and definitions refer to Chapters 6.1.1.1 and 6.1.1.2.
1
Transmission time, bandwidth, dependability and security are interrelated. One can for example improve one quantity at the expense of another. For example, for a fixed bandwidth, security can be improved at the
expense of transmission time and/or dependability. The particular choice depends on the actual system requirements and on practical limitations.
2
The interdependence between dependability and communication quality parameters (SNR or BER) is explained in IEC 60834-1. The figures suggest that for a BER of <10-6 the teleprotection shall not suffer a noticeable
dependability deterioriation. For a BER of 10-6 to 10-3 the teleprotection shall still be able to perform its function, although a certain loss in dependability is to be expected.
3
The interdependence between security and communication quality parameters (SNR or BER) is explained in IEC 60834-1. The figures suggest that the teleprotection shall guarantee a stated security against unwanted
operation irrespective of the actual BER or SNR (worst case scenario).
4
Although the requirement on bandwidth or data rate is low for command based protection schemes, a channel with 64 kbit/s capacity (or a multiple thereof) may be requested in digital systems for standardization reasons.
Interface (b) to (b) in Fig. A1-1 to A1-5 Interface (a) to (a) in Fig. A1-1 to A1-5 General
Recovery
Propagation Bandwidth Overall Impact of misconnection; Time (non-
Propagation Propagation Bit Error Rate 1; 2 1; 3
Time or Operating Time Dependability Security Data Integrity Need for terminal redundant
Time Time Variation (BER)
Symmetry Data Rate 1 TA 1 addressing systems) and
Availability
Critical for Low to
Less than 1/2 Critical;
systems medium;
Phase < 10-5 normal; period of the Risk of unwanted tripping;
based on High
Comparison Critical; Critical; < 10-4 during power High; Medium;
loop round- Analog: IEC 60870-2-1
w/o time (< 10ms) (< 0.3ms) power system frequency for IEC 60834-2 IEC 60834-2 Address validation time
trip delay < 3kHz Class I3
stamp fault high end needs to be shorter than
measure- Digital:
protection relay decision time
ment < 10kbit/s
Low to
Less than 1/2 Critical;
medium;
Phase < 10-5 normal; period of the Risk of unwanted tripping;
High
Comparison Critical; Less critical; < 10-4 during power High; Medium;
Less critical Analog: IEC 60870-2-1
with time (< 10ms) (< 10ms) power system frequency for IEC 60834-2 IEC 60834-2 Address validation time
< 3kHz Class I3
stamp fault high end needs to be shorter than
Digital:
protection relay decision time
< 10kbit/s
Critical for Typically
Less than 1/2 Critical;
Longitudinal systems 64kbit/s
< 10-6 normal; period of the Risk of unwanted tripping;
Current based on Medium to High
Critical; Critical; < 10-5 during power High;
Differential loop round- n*64kbit/s high; IEC 60870-2-1
(< 10ms) (< 0.1ms) power system frequency for IEC 60834-2 Address validation time
w/o time trip delay for multi- IEC 60834-2 Class I3
fault high end needs to be shorter than
stamp measure- terminal
protection relay decision time
ment lines
64kbit/s
Less than 1/2 Critical;
Longitudinal typical.
< 10-6 normal; period of the Risk of unwanted tripping;
Current Medium to High
Critical; Less critical; < 10-5 during power High;
Differential Less critical n*64kbit/s high; IEC 60870-2-1
Table 6.1-2: Requirements from protection on telecommunication and teleprotection: Analog Comparison Schemes.
For terms and definitions refer to Chapters 6.1.1.1 and 6.1.1.2.
1
Transmission time, bandwidth, dependability and security are interrelated. One can for example improve one quantity at the expense of another. For example, for a fixed bandwidth, security can be improved at the
expense of transmission time and/or dependability. The particular choice depends on the actual system requirements and on practical limitations.
2
The relationship between dependability and communication quality parameters (SNR or BER) is explained in IEC 60834-2. It is suggested that for a BER of less than 10-6 the teleprotection shall not suffer a noticeable
dependability deterioration. For a BER of 10-6 to 10-3 the teleprotection may still be able to perform its function, although a loss in dependability is to be expected.
3
The relationship between security and communication quality parameters (SNR or BER) is explained in IEC 60834-2. The figures suggest that the teleprotection shall guarantee a stated security against unwanted
operation irrespective of the actual BER or SNR (worst case scenario).
4
For pilot wire replacement a propagation time of less than 1ms is required.
PROTECTION USING TELECOMMUNICATIONS
CIGRE JWG 34/35.11
When setting demands on the communication system from line current differential protection
using a digital telecommunications network, we must consider the two basic forms of protection
systems:
These two types of protection system place differing demands on the communication network.
Data integrity
The protocol used for teleprotection must detect errors before any unwanted functions occur.
Security against unwanted operation must normally be given priority over dependability.
Route switching
A protection using GPS as time base is not affected by the number and frequency of route
switching operations. However, the requirement of a maximum acceptable transmission time
must always be fulfilled to guarantee the stated performance for the protection.
Data integrity
The protocol used for teleprotection must detect errors before any unwanted functions occur.
Security against unwanted operation must normally be given priority over dependability.
Route switching
A protection using the communication system for time synchronization can not allow too many
or too frequent route switching operations. The maximum number or frequency of route-
switches depends both on manufacturer's algorithm for time synchronization and on how much
108 / 172
PROTECTION USING TELECOMMUNICATIONS
CIGRE JWG 34/35.11
the transmitting and receiving times will change due to a route switch.
If the frequency of route switching is high but the change in propagation times is very little, then
the protection will not be affected at all.
If the minimum allowed differential current limit is set to 20% of rated current, and this limit is
used up to 100% of rated current before the we start to stabilize for current through the line, we
can allow up to 1.2 ms difference between transmit and receive times, because
This gives a time difference for the comparison of the current vectors of 0.6ms = 10.8 degrees
in a 50 Hz system, resulting in a differential current of sin(10.8) = 0.19*Irated.
To obtain a protection with high sensitivity the difference in receive and transmit time must be 5
to 10 times less than given in the example above. This results in a maximum time difference
between the transmit and receive direction of around 0.1 - 0.25 ms only.
Blocking schemes, on the other hand, include a coordination delay timer setting to compensate
for communication signal latency. This timer is set based on the longest expected blocking
signal delay. Signal delays greater than the timer setting will cause the relay to incorrectly trip
the line breaker for an external line fault. The teleprotection function should measure
communication signal delay and alarm if the delay is above a predetermined percentage of the
blocking timer setting.
Intertripping schemes typically have rather high demands on both dependability and security,
109 / 172
PROTECTION USING TELECOMMUNICATIONS
CIGRE JWG 34/35.11
Requirements such as BER and unavailability other than time constraints and data rates are
based on and similar to the present power line teleprotection requirements. The BER
requirement taken to satisfy field data for teleprotection unavailability, due to microwave
channel disturbances, should be of the order of 10-5. The system unavailability requirement is
significantly related to the sum of sustainable equipment availabilities for a microwave
teleprotection system, but the availability of protective relay still does not match the system
availability model. Double redundancy is indispensable when considering maintenance of
teleprotection systems, particularly at EHV levels.
From both network viewpoints of power systems and telecommunications, wide-area or network
protections will increasingly become more important in future complex and enlarged power
systems to meet the customers‘ demands of cost reduction and higher reliability. FACTS, for
example, is taken into account for stabilizing and optimizing the large interconnected power
systems of the future. As these system are situated in the grey zone between protection and
control, the possibility of such centralized or decentralized protection or control systems would
form what is likely to be a large secondary control system. Therefore, requirements and
evaluations with regard to network aspects would be needed. For example, as most protection
systems are constructed in a redundant manner, when there are two network protection
systems, A and B, that are overlapping with each other on one component, c, if each of the
corresponding redundant components of network protection systems A and B is out of service,
110 / 172
PROTECTION USING TELECOMMUNICATIONS
CIGRE JWG 34/35.11
and if the critical common component c gets into failure, both protection systems are required,
possibly leading to a more extensive outage. Therefore, such cross dependability and security
checks among network protection and control systems for complex power systems will become
significantly important. A procedure to avoid the inappropriate overlapping of telecommunication
channels is also needed for power system stabilizing protection systems as shown in Figure
6.1-1. A failure on the overlapped link may result in a halt or failure of the protection system
operation.
Both the protection function and telecommunication system place requirements on the
teleprotection function, which are summarized as follows:
- Present a compatible interface, suitable for the application and environment
- Control transmitted signals/messages and monitor received signals/messages to:
à Guarantee the required signal/message integrity
à Supervise the availability of the telecommunication circuit
à Reject signals/messages that are not destined for the local protection device
à Raise an alarm in case of abnormal conditions and take appropriate action
Refer to IEC60834-1 [27] and IEC60834-2 [28] for more information about requirements on
teleprotection functions.
111 / 172
PROTECTION USING TELECOMMUNICATIONS
CIGRE JWG 34/35.11
Standard interfaces that address these issues should be used, where applicable and whenever
possible. However, standards do not exist for all interfaces or leave room for mutual agreement
between manufacturer and user, in which case the interface must be completely specified to
ensure compatibility.
Digital communication systems for analog comparison and state comparison protection
functions carry messages between digital protective relays at each end of a power line. The
relays continuously transmit and receive new messages as the relays continuously monitor
power system parameters, watching for abnormal conditions that may require them to act swiftly
and securely to interrupt and isolate the cause of the power system abnormality. The messages
contain data that are critical to the proper operation of the relays. Each message includes a
“frame” that may include a destination address, data formatting information, and error checking.
Message timing may also be critical. Any data, framing, or timing errors introduced in the digital
communication system can, and probably will cause relay misoperation if not detected and
rejected or corrected. Most digital relays that send and receive digital messages therefore
include message error checking schemes to verify that each received message is accurate and
valid before using the data contained in the message.
Bad messages may be the result of a single transient noise burst caused by an internal
communication system problem, or by an external condition like lightning, or power system
electrical switching transient. Bad messages may also be the result of signal attenuation caused
112 / 172
PROTECTION USING TELECOMMUNICATIONS
CIGRE JWG 34/35.11
by the declining health of communication circuits or equipment. Bad messages can also be
good messages sent to the wrong location by faulty communication switching equipment, or
intentionally misrouted, such as in a loop-back condition performed during communication circuit
testing. No matter what the cause, the digital protective relay or associated digital
communication system interface must detect and reject or correct bad messages (including
misrouted good messages) to prevent misoperation. It is common practice to alarm or
annunciate a communication problem to alert the appropriate communication system
maintenance personnel about existing or impending communication system problems. Some
relays log communication errors to help diagnose the nature and cause of communication
system problems. At the very least, the relay should provide a time-delayed output to alarm for
the continuous receipt of bad messages or complete loss of messages. In addition, modern
digital relays can perform other logic functions to modify their performance, or the performance
of the communication system when a problem occurs.
While it is important that the teleprotection function and telecommunication system send and
receive messages between protective relays as reliably and securely as possible, it is also
important that these functions not resend old messages and data that error checking
determined were not correctly received at the remote terminal. The teleprotection and
telecommunication systems should continue to send only the newest messages and data, and
discard old messages and data. Resending old messages may delay proper protection scheme
operation, or cause protection scheme misoperation and incorrect breaker tripping.
When a message error is detected, the message is rejected and the protection is reset. Below a
predetermined message error rate, the protection remains stable but the operating time is
delayed due to the loss of messages. If the percentage of messages rejected exceeds a value,
e.g. 25%, during a defined period of time, the operating time becomes intolerable and the
protection is blocked until the message error rate decreases to acceptable values.
On blocking, a “channel failure” alarm is raised by the relay and sent to indicate a failure in the
communication channel. If the protection uses only one channel, the “protection function failure”
alarm is also raised. Some protection systems have a redundant channel through a different
communication path so the channel with a better performance is selected. In case of failure in
both channels, both channels and protection alarms are raised.
113 / 172
PROTECTION USING TELECOMMUNICATIONS
CIGRE JWG 34/35.11
consecutive messages be received with the direct transfer trip bit asserted before taking action
to perform the direct transfer trip output. This is analogous to using a time delayed output in an
analog scheme to improve the security of an output.
Likewise, if a bad message is detected, the protective relay should reject and ignore the bad
message, and may assume the status of each bit in the expected message based on
predefined criteria. For instance, the relay may be programmed to assume the bit should be in
one of three states if the message is bad:
- a logical zero (0)
- a logical one (1)
- or it should retain the status the bit had in the last good message.
For additional security, the relay may require that several good messages be received after one
or more bad messages to ensure that the communication system has returned to a satisfactory
performance level before using the bits in the new messages.
In addition to alarming, digital protective relays may also take additional action when
communication system problems persist. For instance, the protection scheme could:
- force the communication system to switch communication paths or activate a redundant
communication channel.
114 / 172
PROTECTION USING TELECOMMUNICATIONS
CIGRE JWG 34/35.11
The second method employing time tagging is preferred, as the comparison of the respective
samples then does neither depend on equal signal propagation times for the 'go' and 'return'
direction (propagation time symmetry), nor on stringent limitations for signal propagation time
variations. See also chapters 6.1.1.1 and 6.1.1.2 for explanations and definitions.
As propagation time symmetry may be jeopardized when communication channels are re-routed
upon a failure in the communication network, or because signal propagation times may vary
with time due to signal buffering and queuing in the network, time tagging is a prerequisite for
protection using general communication networks, unless the network has been explicitly
engineered to comply with the timing requirements that are imposed by the protection relay.
Refer for example to Chapters 4.2, 4.6 and 6.1.
In conclusion, whatever method for time synchronization is chosen, the protection relay - when
used in conjunction with modern telecom networks - will have to cope with:
- Static propagation times
115 / 172
PROTECTION USING TELECOMMUNICATIONS
CIGRE JWG 34/35.11
Many problems are caused by bad installation practices and by using inappropriate
telecommunication services for the required teleprotection signalling function.
This chapter attempts to capture a number of critical issues, and highlight the areas that may be
the source of service failure if adequate standards of installation are not implemented.
Fundamentally the protection requires a telecommunications bearer service that will provide
perfect performance during electrical network faults. This may only be two or three times per
year and requiring the allocated circuit traffic capacity for no more than a few seconds. The
protection engineer also expects the telecommunications bearer service to be monitored and
managed by the circuit provider. On the whole this can not be achieved.
As the monitoring of the bearer services provided must, by default, be a task performed by the
teleprotection function/device, manufactures and protection engineers require to develop alarm
strategies that are more in keeping with the bearer services provided and the needs of the
scheme.
To achieve this requirement teleprotection signaling devices and bearer circuits require to be
procured that will guarantee quality of service before, during and after any incident. The circuit
shall be designed to provide a secure and resilient service that will continue to function, within
specified limits, before, during and after an electrical fault or network disturbance. The total
116 / 172
PROTECTION USING TELECOMMUNICATIONS
CIGRE JWG 34/35.11
connectivity, including local connections and local power requirements, must not compromise
the ability of the teleprotection function to perform its task.
When designing and provisioning the required network bearer service the following should be
considered:
- Is the bearer service immune to electrical disturbance?
- Can the bearer service provide the required operating characteristics?
- Can the bearer service provide the managed resilience and diverse routing in
compliance with service needs?
- Does the teleprotection function raise an alarm if the bearer service does not comply
with pre-defined characteristics?
- Assuming that we can provide immune external bearer services, how do we ensure that
we do not compromise the ability of the protection service to function by poor local
installation practices?
It is imperative that the methods used to interconnect and power the teleprotection signalling
device and the bearer service addresses the needs to comply with standards for EMC, RFI, rise
of earth potential and other electrical disturbances. If this is done the security and integrity of the
service will not be compromised
The existing arrangements developed over a number of years were introduced at the time
teleprotection signaling schemes were reliant on physical copper connections and / or voice
frequency bearer services.
The PTO (Public Telephone Operator) Bearer Service Providers, have over the last 20 years
significantly revised their networks and the services available on them. Copper with DC
connectivity is no longer available and the analogue network infrastructure, used to deliver voice
frequency services, has now been replaced by new digital network infrastructures. Most voice
frequency services are now derived from digital technologies.
Methods used to deliver the bearer service to the teleprotection device within the substation
have evolved rather than been developed to meet the changing needs of the service. Protection
services have become more sophisticated and in turn demands more from the bearer service
provided. The migration of service provision from pure analogue services to analogue derived
digital services has already caused problems with Differential Delay for analog comparison
Protection schemes. Guaranteed and consistent circuit parameters can no longer be assumed
on networks delivered by public service providers. Network and local considerations must be
addressed and understood.
In the typical electrical hostile environment found in substations it is necessary to ensure that
the equipments are compliant and the methods used to house, power and interconnect these
services will not compromise the effective operation of bearer or teleprotection device.
If consideration is given to the above likely risks, existing configurations can be made secure
and should provide trouble free service. Future developments and operational strategies should
however identify the best methods that are now available to minimize the likelihood of
teleprotection failure.
Proposals are now being developed that use the increased availability of optical fibre service
provisions and interface devices.
If external services can be provided over alternatively routed fibre and interfaced with
117 / 172
PROTECTION USING TELECOMMUNICATIONS
CIGRE JWG 34/35.11
appropriate service equipments housed in EMC / RFI cubicles, the likelihood of bearer service
failure, during an electrical disturbance, will be greatly reduced.
If power requirements are designed to include appropriate filters and surge arrestors and if
cables are run in appropriate fashion, the interference experience by noise on DC power
supplies to equipment will be insignificant.
The connection from the delivered bearer service to the teleprotection device must consider the
local environmental risks and adopt the most appropriate interface. This connection from EMC /
RFI cubicle to teleprotection device may be best achieved by using Optical Fibre cable and the
appropriate converter units at each end.
When copper cable is being used best practice for screening and route choice, to reduce the
impact of induced voltage, may provide acceptable results.
A comprehensive treatment of EMC including practical design-, cabling- and installation guides
is found in [37] and in the IEC standards below.
118 / 172
PROTECTION USING TELECOMMUNICATIONS
CIGRE JWG 34/35.11
In general, all state comparison and intertripping schemes require less communication
bandwidth and are virtually immune to communication delay variations. Communication system
bandwidth and delay variation requirements for analog comparison protection schemes, on the
other hand, vary widely and must be segregated to identify their differences. Notations are
made, where appropriate, to explain unique conditions that impact the protection scheme and
telecommunication technology selection.
Three tables are used to segregate the telecommunication technologies into the basic types of
communication service outlined in ANNEX A1:
- Media for Dedicated Point-to-Point Service (Table 7.1-1)
- Multiplexing Technologies for Shared Point-to-Point Service (Table 7.1-2)
- Network Technologies (Table 7.1-3).
In general, the characteristics of dedicated point-to-point service are determined by the installed
media, which have a wide range of bandwidth and delay characteristics. Multiplexed point-to-
point service is also heavily influenced by the installed media, however, the media selected for
these systems generally have wide bandwidth capability. The overall performance is therefore
most significantly influenced by the multiplexing technique. Consideration must also be given to
the affect that intermediate drops, repeaters, communication “load”, and multiplexing steps will
have on the overall end-to-end performance, especially delay characteristics. Network systems
are comprised of communication branches, taps, and loops, where the physical media may be
different on different parts of the network. Like multiplexed point-to-point systems, the media
selected for network systems generally have wide bandwidth capability. Network system
performance is therefore most significantly influenced by network transfer protocol.
Consideration must also be given to the affect of network configuration, network communication
loading, and operational switching.
The following three tables present the expected protection scheme performance using individual
communication technologies. It must be stressed that protection systems rely on end-to-end
communication performance. Evaluation of end-to-end performance on telecommunication
systems that include a mix of media, multiplexing technologies, and network technologies must
consider the worst case sum of all technologies used in the communication path. The best
performance can therefore be expected from simple, direct, homogeneous communication
systems. The performance of complex networked communication systems may be very difficult -
if not impossible - to predict. Experimental field trials may provide the best indication of
expected communication system performance.
119 / 172
PROTECTION USING TELECOMMUNICATIONS
CIGRE JWG 34/35.11
Unlice
nsed Optical
Licensed Radio
Metallic wire pairs Power Line Carrier Radio fibre
(Microwave)
(see 4.3.1) (see 4.3.2) (see (see
(see 4.3.3.1)
4.3.3.2 4.3.4)
)
Voice
Protection
Pilot wires Frequency Analog Digital
Scheme Analog Digital Digital Digital
(see 4.3.1) Circuits (SSB) (QAM, MCM)
ê
(see 4.1.2)
All State
Comparison
(1), (2) OK OK (6) OK OK (8) OK
Schemes
(see 3.1.2)
Direct
intertripping (1) OK OK (6) OK OK (8) OK
(see3.2.1.2)
Digital Current
Not (3), up to
Differential (1) (3) Not applicable (3) (3), (8) OK
recommended 19.2kbit/s
(see 3.1.1)
Analog current
Not
differential OK OK (8) (3) (3) (3), (8) (3)
recommended
(see 3.1.1)
Pilot wire
relays Not
OK Not used Not used Not used (4) (4) (4)
(50/60Hz) used
(see 3.1.1)
Phase Not
Comparison (3), (5) (3), (5) (3), (5) recommended (3) (3) (3), (8) (3)
(see 3.1.1.2) (8)
Charge Not
Comparison (3) OK OK recommended OK OK (8) OK
(see 3.1.1.3) (8)
Notes:
(1) Possible using audio tone communication.
(2) Direct Transfer Trip is possible using d.c. voltage scheme, typically applied with ac current differential protection scheme.
(3) OK if communication channel delay is kept within the relay’s delay compensation adjustment range
(4) Possible, if delay can be kept below 1ms
(5) Analogue non-segregated Phase Comparison only
(6) OK with (analog) sub-system for teleprotection command transmission, see 4.3.2
(7) OK for command-based systems
(8) Might be possible, however not recommended for reliability reasons. No applications in HV grids reported
120 / 172
PROTECTION USING TELECOMMUNICATIONS
CIGRE JWG 34/35.11
Notes:
(1) OK if communication channel delay is kept within the relay’s delay compensation adjustment range.
(2) Dynamically allocated bandwidth is not recommended unless one has full control over delay
(3) No practical installations using Code Division Multiplexing for protection have been reported yet.
(4) Possible, if delay can be kept below 1ms
121 / 172
PROTECTION USING TELECOMMUNICATIONS
CIGRE JWG 34/35.11
Notes:
(1) No experience yet, but no obvious reason why it will not work with proper network design and ATM QoS guarantees, see
ANNEX A3.
(2) Might be applicable in future WAN with proper network design with QoS guarantees. Today (1999), QoS standards are
still evolving.
(3) Not recommended unless the circuit is permanently established. Call setup is too slow or may be rejected. Connection
may not be under the control of the service user or may be released inadvertently.
(4) Delay is non-deterministic and may be excessive under heavy traffic load
(5) OK, if requirement for propagation time symmetry is met, or protection terminals compensate for delay asymmetry
(6) Protection devices may have to cope with significant propagation time and propagation time variation
(7) OK if propagation time is within the relay's compensation range and delay variation is limited, see chapter 6, Table 6.1-2
(8) Transparent transmission of analogue signals is not supported
(9) If propagation time of less than 1ms end-to-end is guaranteed by the network
122 / 172
PROTECTION USING TELECOMMUNICATIONS
CIGRE JWG 34/35.11
Table 7.1-4 broadly summarizes communication technologies and highlights some critical
issues that have to be addressed even when a properly designed communication
link/system/network is assumed.
123 / 172
PROTECTION USING TELECOMMUNICATIONS
CIGRE JWG 34/35.11
7.2.1 Application
1. Are protection and communication scheme compatible? (Refer to tables in chapter 7.1)
q What protection schemes are needed?
q What communication schemes are available?
q Are redundant protection and/or communication schemes required?
2. Does the selected teleprotection scheme provide the required performance? (Refer to
chapter 6)
q Teleprotection operating time (refer to Figure A1-5)
q Dependability
q Security
q Addressing
q Availability during power system fault conditions (EMC/RFI)
q Telecommunication outage recovery time (sometimes referred to as 'protection
switching time')
7.2.2 Interfaces
(see Table 7.2-1)
q Type of interface
q Electrical / optical parameters
- Connectivity
- Electrical (voltages)
- Optical (power budget)
q Physical / mechanical
- Connectors
- Pins / pinout
q Power requirements
- Converters
q Cabling
- Shielding / grounding
- Type of cable / wire
- Cable length
- Who supplies
q Environment
- EMC
- Distance
124 / 172
PROTECTION USING TELECOMMUNICATIONS
CIGRE JWG 34/35.11
7.2.3 Contractual
q Performance monitoring
q Reporting
- Communication system
- Protection
q Guarantees
q Network policy
- Priorities
- Who decides
- Disaster recovery plan
q Technical support
- Hot line
125 / 172
Table 7.2-1 Part 1: Contact Interfaces and Analogue Interfaces
Contact interface
input Optocoupler input Pick-up time Electrical isolation
current
circuit
2-wire EMC standards
Impedance
Bandwidth / Frequency Crosstalk
input Receive level Electrical isolation
spectrum (Near-end, far-end)
Isolation/Insulation
4-wire
Voltage
Current Wiring, wire diameters
n-wire
output Signal dynamic range
(n = 2,3,4)
Impedance Type of terminals / wire termination
Insulation / Isolation
Signal flow directions
Voltage
Current EMC generic standards
Pilot wire n-wire
1
Type of interface (a) or (b) refers to the definition in the Figures A1-1 to A1-4 in ANNEX A1.
Table 7.2-1 Part 2: Digital Serial Interfaces and Optical Fibre Interfaces
Data format?
(e.g. Start, Stop,
Asynchronous Parity, Number of
RS232 operation bits) Connector type
Data rate and tolerance (male / female ….)
V24./V.28 Data flow control? Connector pin-out
Device DTE or DCE
Do data pattern
designation? Which signals of the standard are
RS 422 restrictions apply? (e.g.
0/1 density) being used?
Digital circuit
RS 485 Synchronous Clock provisioning: Signal flow directions
(electrical) operation
Clock master / EMC standards
Serial interface
slave?
Electrical isolation
Optical wavelength
Fibre bandwidth
Multimode fibre
(MHz * km)?
Spectral width of light
Optical power
output source (LED, LASER) Connector type, Standard
launched into fibre?
Single mode fibre Optical signalling speed Fibre type, Standard
(pulse rate)
Number of fibres needed
Fibre bandwidth
Multimode fibre Optical wavelength
(MHz * km)? Compatibility between F/O
Min. / Max. optical transceiver and fibre
input Optical signalling speed
Table 7.2-1: Checklist for Interface co-ordination between protection / teleprotection / telecommunication devices
1
Type of interface (a) or (b) refers to the definitions in the Figures A1-1 to A1-4 in ANNEX A1.
PROTECTION USING TELECOMMUNICATIONS
CIGRE JWG 34/35.11
- New transmission technologies, particularly in fibre, now provide abundant capacity for
any utility application. Commercial transmission solutions already provide capacity in
excess of 100 Gbit/s. Experimental work indicates that viable solutions with 10 times this
capacity will be available soon. The ‘theoretical’ limit is still another order of magnitude
above today’s experimental level.
- Integration of services is a main development in the telecommunications industry. This
requires unified transport, switching and service-access systems. For this integration to
take place mechanisms to guarantee a certain level of Quality is required. Quality of
Service (QoS) -provisioning is now becoming an integral part of the network allowing any
service to be connected/maintained with a guaranteed QoS-profile.
These new telecommunications and data -communications technologies will mean that utilities
may be able to buy standard, off-the-shelf telecommunications products or even outsource their
communications needs. Within the Communications/Protection area of the utilities, the focus is
expected to shift from communication network design to a more facility managed approach.
The switching of a container through new network paths is highly undesirable for differential
protection applications in that the receive and transmit paths may have different routes and thus
different time-delays. Several solutions are being proposed to overcome this, such as adapting
the differential protection schemes to independent reference clocks or to use ‘channel locking’
to fix the paths of the containers that hold the teleprotection information on a permanent basis.
128 / 172
PROTECTION USING TELECOMMUNICATIONS
CIGRE JWG 34/35.11
in the fibre and exploring optical technology to switch individual bandwidth-slots in each node of
the network.
It has been shown that an ATM network may easily maintain and exceed the IEC Integrity level
3. Therefore security and, with a proper network topology, availability requirements may be met
with ATM networks.
Both absolute time delay and time delay variations are QoS-parameters that can be specified at
call-set-up in an ATM-network - provided the ATM-nodes are designed for this. In practice this
means that the Teleprotection messages are switched into high priority queues where no or little
other traffic may be waiting, and that the interface access is sufficiently fast ( > 2 Mbit/s).
However, the achieved time-domain granularity may not be sufficient in some networks to give
the desired QoS-profile, unless special considerations are made.
Several techniques may be employed to get around the time delay problems. They will need
careful validation before they can be considered to be mature.
Of special interest to the utility-applications is the fact that existing IP-Networks have been
designed for the transmission of ‘delay-insensitive’ data. Such best effort technologies are not
sufficient for power-utility applications. However, triggered by the onset of applications such as
‘multimedia’, new promising protocol-suits are emerging such as IPv6 (Latest Internet Protocol),
RVSP (Resource Reservation Protocol) and RTP/RTCP (Real Time Protocol / associated
Control Protocol). These new protocols will allow integration of diverse services with QoS-
specific profiles for each application. Although security and dependability can be secured with
the new protocols, transmission time is still a critical issue at present. It is still not clear whether
this will be resolved with sufficient granularity on the IP-platform.
- ATM solutions are being implemented where the ATM technology accounts for a fair
portion of the transport mechanism, only the lowest layer (multiplex section and
downwards) is left to SDH components
- ATM has through its Adaptation Layers provisions for direct access to services
129 / 172
PROTECTION USING TELECOMMUNICATIONS
CIGRE JWG 34/35.11
A set of other and more detailed scenarios could be given. This, however, is outside the scope
of this brochure.
Essential for all these technologies is a Network Management system. Most systems on the
market today are Element Management systems strongly coupled to a particular vendors
equipment. There are some generic management platforms in existence today, but these
generally require substantial work to be developed and maintained in a specific network
environment consisting of multi-vendor equipment. Partly because of the complexity of the
network management system, unifying and simplifying the network technologies and limiting the
number of different equipment in a network is clearly an important task in smaller networks.
Three Network Management technologies are under development at present:
TMN is the only approach that gives a complete management view at present. The other two
platforms may also be suited for a network view but this requires some extra (often) network-
specific development. It will still take time before any of the platforms have reached a stage
where they can provide a multivendor/multitechnology network view without proprietary
development.
Amongst the latest developments, Dynamic Time-slot Multiplexing (DTM) and Dynamic Packet
Transport (DPT) are the approaches that can better suit the QoS requirements of
Teleprotection.
Both technologies are based on the same working principle, the transport of IP packets over
SDH/Sonet networks, being the main differences between them the actual implementation and
the scalability limit. In both cases the bandwidth allocated to transport a flow of IP packets can
change dynamically during the life of the flow. Although these technologies are currently
focused towards MAN applications, there is no reason that prevents its application in a WAN. It
can be noticed that whilst DPT is more focused towards IP transport, DTM seams to be a more
generic approach that will be able to transport virtually any type of traffic.
The development of these technologies has not been fully completed although some field
installations are offering basic services and a comprehensive range of equipment has been
announced.
The process to consider these technologies a candidate for service provision will require a
standardization process to be successfully accomplished. None of the main standardization
bodies, the ITU-T (International Telecommunication Union), the IEC (International
Electrotechnical Commission) or the IETF (Internet Engineering Task Force), have already
accepted to start-up such a process.
130 / 172
PROTECTION USING TELECOMMUNICATIONS
CIGRE JWG 34/35.11
Figure 8.1-2 shows a concept of an integrated substation and the relationship between
applications from the Utility Communications Architecture (UCA) proposed by EPRI [23]. UCA
provides integrated utilities computer communication protocols which enable a wide variety of
utility information and control systems to share data seamlessly including real-time
communications among corporate headquarters, power plants, control centres, substations,
distribution automation equipment, and customer sites. Since UCA covers not only SCADA
systems, RTUs and substation automation devices, but also microprocessor-based intelligent
electronics devices (IED) including numerical relays, protective relay communications are also
accommodated by such networks.
The siginificant work in the UCA proposal is to identify how equipment should interoperate, and
how IEDs (Intelligent Electronic Devices) publish and subscribe to each other's information.
Substation devices and functions are represented as standardized object models in GOMSFE
(Generic Object Models for Substation and Feeder Equipment) in the UCA proposal. Modeling
131 / 172
PROTECTION USING TELECOMMUNICATIONS
CIGRE JWG 34/35.11
provides a way to standardize information exchange between other models and devices.
As the IEEE 802.3 Ethernet technology is proposed for protection communications, its dynamic
performance has been evaluated by simulating the LAN traffic that would be generated by a
particularly severe incident in a typical substation. Under the reasonable assumption that
messages generated by a power system fault are spread over 1 millisecond, it was found that
[24], [29]:
- A 10 Mbit/s shared hub Ethernet network has limited performance, as it can deliver less
than 20 messages in 4ms.
- Three types of LANs (10 Mbit/s switched hub, 100 Mbit/s shared hub, and 100 Mbit/s
switched hub) all can deliver 100 messages within 4 ms if messages are spread over 1
ms.
Digital
Communications
Equipment
Relays Meters Oscillography
Diagnostics
Sensors
These intra-substation networks can be used for transmitting protection signals among
protective relays inside a substation and for supervising and controlling protective relays. As
supervisory and control information can be also transmitted to other substations or control
centres using wide-area networks (WAN) connected to the intra-substation networks (LAN), the
issue is whether one can use the substation LAN for communicating between protection relays
in different substations or not.
In general, networking protocols and the data traffic they support can be characterized as being
either connection-oriented or connectionless.
With a connectionless protocol, no interaction between the terminals takes place prior to the
exchange of data, and no fixed path through the network is set up. Data packets are routed
132 / 172
PROTECTION USING TELECOMMUNICATIONS
CIGRE JWG 34/35.11
through the network individually on a hop-per-hop basis. Connection-less thus also means that
data packets that belong to the same message may follow different routes with different signal
propagation delays through the network, and that the message transfer delay is determined by
the slowest packet. As data packets may not arrive in the same sequence as they have been
sent, they have to be re-assembled in the correct order at the receiving end. Because of its non-
deterministic latency characteristic, connection-less type of communication has so far not been
utilized for the transmission of protection signals across a WAN.
With a connection-oriented protocol between two network terminals, the source and destination
terminals interact with one another prior to the transport of data in order to set up and secure a
fixed connection between them. All data packets or cells will follow the same route once the
path has been established. A connection may be requested by the terminals through a
standardized signalling protocol or dial-up procedure (e.g. PSTN or ISDN), or a permanent
connection may be established by the network operator on a contractual basis (leased lines), or
the network may provide a fixed and permanent connection by design ('hard-wired' circuits).
Since WANs that are based on PDH and SDH technology (see Chapters 4.4.2, 4.6.2.1) provide
a set of permanent communication channels with fixed bandwidths and minimum signal transfer
delays, they are today the first choice in the selection of network technologies for the fast and
reliable transmission of protection signals.
More on the subject of WANs and telecommunication networks is found in Section 4 of this
document.
In conclusion, LANs and Gateways can introduce substantial and unpredictable time delays
which may not comply with the total available time budget for protection signal transmission.
Considering the stringent requirements for bounded signal propagation times (upper limits,
propagation time variation and -symmetry) and Quality of Service guarantees, it seems more
advisable to link protection relays directly via PDH or SDH channels (and perhaps ATM with the
most stringent AAL Class 1), thus bypassing the LAN and the Gateway by using a deterministic
serial data link to access the WAN.
A very careful bandwidth and latency study would need to be performed in any case.
133 / 172
PROTECTION USING TELECOMMUNICATIONS
CIGRE JWG 34/35.11
Because of the emerging competitive market in the utility area, cost-saving aspects will be
become more and more a key issue. Future protection schemes should be reliable, more
intelligent and above all cheaper. Therefore, the use of new information technology and data
processing will be necessary.
Protection Systems
In the present situation HV networks are protected by schemes and philosophies that are mainly
based on the following technologies:
- Analog comparison protection
- State comparison protection
- Teleprotection
Today, most applied protection schemes only use limited communication facilities (point to point
connections via analog links or sometimes digital 64 kbit/s channels).
The relays used in present schemes mostly get only information on bay level. The connections
to the transformers and HV devices in that bay are hard wired.
In the future, the use of communication networks enables the possibility to collect real-time
information from a much wider area than only from a substation bay. Summarized can be
stated:
134 / 172
PROTECTION USING TELECOMMUNICATIONS
CIGRE JWG 34/35.11
Future: - Analog comparison-, state comparison- and new wide-area protection systems
- LAN technology in substations to interconnect all equipment inside substations
- WAN based on SDH/ATM technology with enhanced real-time IP to interconnect
substations with high speed communication
- Integration of protection and control in one device with separate functions program
modules
- Voltage, current, active and reactive power flow values available as real-time
information on LAN level in a substation and on WAN level in HV networks
Challenge: - To do more and to use more intelligent protection solutions based on advanced
real-time (<5ms delay times) communication possibilities on LAN level in
substations and on WAN level in a HV network
The following Figure 8.2-1 represents a substation LAN which is connected to all the relevant
equipment within the substation. The circle represents a LAN connected to the various
substation devices (dotted lines). The square boxes represent integrated protection and control
units.
LAN
P/C
P/C
P/C
It is assumed that in substations, equipped which such a LAN, all the relevant information for
protection and control is available on the LAN and can be used by all protection and control
devices. This means that every relay can protect not only one bay, but it can perform protection
calculations with information from all other bays within the entire substation. Relays can even
135 / 172
PROTECTION USING TELECOMMUNICATIONS
CIGRE JWG 34/35.11
send trip commands to the other circuit breakers of the various bays via the LAN connection. In
this situation, distributed processing of protection functions and distributed redundancy will be
possible in a substation. Therefore, separate redundant hardware modules for every single bay
can be avoided. The amount of hardware may even be reduced to two or three dedicated
devices that protect the entire substation and connected lines and transformers. In such a
system, substantial cost-savings in protection schemes will be obtained.
WAN
LAN - A LAN - B
LAN - C LAN - D
In Figure 8.2-2 a high-voltage (sub-)network consists of various substation LAN's which are
interconnected by a WAN. In such a system, all information is available on every
protection/control device within this WAN network. Depending on the possibilities of the relays,
distributed processing of protection functions for analog comparison-, state comparison,
intertripping and wide-area protection can be carried out.
This communication structure creates new opportunities for future protection schemes on
network level. In the telecommunication industry, path protection and re-routing is an integrated
function. May be in the HV environment future protection can also co-operate with network
management like in the telecommunications discipline, because a lot of real time information is
available that can be used for fault clearing and automatic re-routing. This means that in every
substation bay information of all other bays in the network is available, so it may be used for
more advanced protection functionality and even for re-routing, because the information about
network topology and traffic load is also available.
136 / 172
PROTECTION USING TELECOMMUNICATIONS
CIGRE JWG 34/35.11
Application examples
For the various options mentioned in chapter 5 a few examples of area protection functionality
can be described:
- Petersen earthed HV-networks mostly include overhead lines and to some extent
cables. In case of an earth fault in the cable part, a persisting earthing fault condition is
not acceptable. In that situation a distributed area protection can determine the fault
location fast and accurately and trip the faulty cable.
- Cross-country fault clearing can be better carried out by a second protection level, also
by an area protection. The first protection level trips the fault selective or if not, only one
of the two faults places. Because of the complexity of a cross-country failure, the fault
clearing can be more selective with the second protection level and if necessary, a
remaining earth fault can be tripped. Apart from that, the determination of the fault, that
has to be cleared (the first fault) can be based on the network topology.
- A future reactive power protection could be build by processing voltage on HV busses
and reactive power flows in HV- (sub-) networks. A smart load scheduling application in
combination with reactive power protection can be used to minimise the number of
customers that will be switched off.
Conclusion
Application of LAN in substations in combination with a HV network WAN, with SDH, ATM and
real-time Internet Protocol communication challenges the design of future protection systems.
The existence of an information WAN on HV network level is the main advantage. This gives the
possibility of creating distributed processing and inherent redundancy. This means that the
number of protection devices, including wiring to the HV components, can be reduced without
loss of availability, dependability and security of the system, if the stringent real-time
requirements can be met by the proposed concept.
As for today, interoperability has only be possible between protection relays in state comparison
protection schemes (see Chapter 3.1.2) that use simple contact interfaces (see Chapter 5.1) for
exchanging binary state information between the local protection relay and the relay at the
remote end. The reason for this favorable situation can be attributed to the fact that the
communication between relays is reduced to the simple exchange of "Trip" or "Do not trip"
commands, and that the protection relays can perform their impedance/distance algorithms at
137 / 172
PROTECTION USING TELECOMMUNICATIONS
CIGRE JWG 34/35.11
each line end independently from each other even when proprietary algorithms are used. Thus
only a minimum of co-ordination - if any - between relays is needed.
The situation is however less satisfactory for analog comparison protection schemes like current
differential protection, or for state comparison protection schemes when the teleprotection
function is integrated in the protection relay. Main reasons for incompatibility are proprietary
protection algorithms and/or proprietary communication protocols due to missing standards or
due to the choice of different options from existing standards.
The standards to be developed for protection relay interoperability would have to encompass at
least Layers 1 to 4 in the OSI reference model (Figure 4.5-3) when networking functionality shall
be included in the (tele-)protection device. True interoperability between protection relays would
require to develop standards for all layers of the OSI reference model, including the Application
Layer. Whether interoperability of protection relays from different vendors would justify the
development of a full set of complex standards is questionable. Nevertheless, it is becoming
clear that for future designs consideration should also be given to emerging standards in related
areas of utility communication, and that existing standards should be applied whenever possible
and economically justified.
Some ongoing - and for future teleprotection possibly relevant - standardization activities are:
As for today, protection systems using telecommunication are still some distance away from
"plug-and-play" solutions, particularly for analog comparison schemes. This is one of the areas
where forthcoming standardization may show promise.
138 / 172
PROTECTION USING TELECOMMUNICATIONS
CIGRE JWG 34/35.11
9 CONCLUSIONS
The Telecommunications evolution and the IT revolution has resulted in the need to reconsider
tried and tested methods of delivering teleprotection schemes and their associated bearer
services. The roll out of new communication network technologies presents possible
opportunities for cost efficient and advanced solutions for teleprotection systems. Wider
bandwidths offer scope for the transmission of higher speed data for improved protection
functionality and potentially better reliability, combined with rich analytical information.
New network technologies can provide improvements in security, availability and resilience, as
modern networks are configurable from a centralized network management system and support
automatic re-routing in case of single link failures. Service availability may therefore be better
than for legacy network technologies or simple point-to-point configurations, and proper network
design can ensure that the risk of single point of failures is reduced.
Network technologies that permit delivery of messages to multiple locations, or collection of data
from multiple locations will be essential for novel schemes such as wide area protection or
system wide protection, stabilizing protection and centralized protection. The continued
development of transport modes that can offer this type of service must be recognized and
suitable design concepts considered.
Optical fibre offers the best solution in an electrical hostile environment and is generally
accepted as the most appropriate communication medium for developing service network
platforms for the Electricity Supply Industry.
New communication network technologies have however also brought up new problems and
new challenges to protection, mostly related to the non-deterministic signal transfer time
behavior. Propagation time, its variation and symmetry are all critical characteristics that require
careful consideration with respect to teleprotection requirements. The inherent problems
associated with latency and signal transfer delay variation of “bandwidth on demand” or "best
effort" techniques may be overcome with the availability of higher bandwidths in the core and
access network, together with controlled Quality of Service mechanisms. Quality of Service
guarantees and sufficiently low network latency may however only be available at significant
additional cost.
Measures to overcome problems related to signal transfer time variations introduced by the
communication network can also be taken in the protection relay, e.g. by time stamping of
measured quantities (samples). It is however obvious that some legacy protection and
teleprotection equipment may not work with, or be able to take advantage of new Telecom / IT
network technologies, because they have been designed for deterministic (with respect to
bandwidth and latency) communication channels.
The economic effectiveness of high capacity service connections with performance guarantees
will always be subject to business justification. Protection is a niche application that has specific
characteristic requirements associated with the bearer services provided by the core business
Telecommunications infrastructure or by the Public Telephone Operator (PTO). Bearer services
for Teleprotection often represent less than 0.001% of network services provided by third party
Telecom Service Providers. It is becoming clear that the Electricity Supply Industry cannot drive
the development of products and standards in the Telecommunications Industry.
The unique requirements for stringent signal propagation delays, delay variation and delay
139 / 172
PROTECTION USING TELECOMMUNICATIONS
CIGRE JWG 34/35.11
symmetry are not common or even similar to any other customers needs. Future Telecom / IT
platforms and services offered by third party network service providers may not be able to
provide circuits that are compliant with existing and legacy teleprotection requirements.
Protection engineers must understand the changes that will be introduced by third party
providers, and develop solutions that are compatible with the new platforms being offered. If
these changes can not be accommodated, the Electricity Supply Industry will require to develop
its own Network for operational needs that can guarantee the long term availability of compliant
and resilient bearer services for the teleprotection and other mission-critical services needs.
Many utilities are already developing their own networks that are dedicated to their operational
needs using optical fibre infrastructure solutions. With an optical fibre infrastructure in place, the
availability of high capacity bandwidth at no additional cost is now implicit. Larger bandwidths
(more information within the acceptable delay) may open the door for new and improved
protection schemes such as multi terminal line protection, selectivity improvement for double
circuit lines and wide-area protection, to name a few.
The cost effectiveness and operational advantages of ensuring continued support of legacy
teleprotection services and the ability to accommodate new schemes on a compliant and
managed network are as yet unproven. Organizational changes that demand outsourcing and
facility management of assets may jeopardize the integrity and security of the
telecommunications platform that provides the essential elements of the electrical power
systems protection schemes.
The combined understanding of Electricity Supply Industry manufactures and the industries'
Protection / Telecommunication Engineers is needed to ensure that risks are minimized and the
most appropriate solutions are adopted.
140 / 172
PROTECTION USING TELECOMMUNICATIONS
CIGRE JWG 34/35.11
Telecommunication system
Teleprotection system
Figure A1-2: Teleprotection connected via dedicated medium or dedicated link (non-shared)
Figure A1-3: Teleprotection connected via multiplexed communication system (shared medium)
141 / 172
PROTECTION USING TELECOMMUNICATIONS
CIGRE JWG 34/35.11
Teleprotection equipment; Converts the information from the protection equipment (relay) into a signal suitable for
Teleprotection function: reliable transmission over a telecommunication link /system/network. Includes all functions
that are necessary to obtain the desired dependability, security, and data integrity.
Performs intermediate function between protection and telecommunication. May also
multiplex signals from several protection equipments/functions, status indications etc. onto
a single telecommunication channel.
Typical layouts:
• Separate equipment for command-based state comparison protection schemes.
Interfaces (a) and (b) are accessible.
• May be integrated into the protection equipment, particularly for analog comparison
protection schemes. Interface (b) is accessible. Interface (a) is equipment internal and
normally not accessible.
• May be integrated into telecom terminal equipment. Interface (a) is accessible.
Interface (b) is equipment internal and normally not accessible.
Telecommunication system; System composed of telecommunication equipment and the associated physical link /
Telecommunication link: medium required to transmit information signals across a distance
Dedicated medium; A medium / link / circuit / channel that carries only the teleprotection service.
Dedicated link:
Multiplexer: A device which combines several signals or services onto a common medium for
transmission
Telecommunication network: A set of communication and switching devices that work in a collaborating way to provide a
telecommunication service between access points distributed over a wide area
142 / 172
PROTECTION USING TELECOMMUNICATIONS
CIGRE JWG 34/35.11
TB
12 - 130 ms
Protection operating time
TA
2 - 70 ms
Teleprotection operating time
(a) (Overall operating time for a teleprotection system) (a)
Propagation
time
(b) (b)
Telecommuni-
Protection Tele- cation system Teleprotection receive function Protection Circuit breaker
equipment protection (-circuit / -link / equipment
transmit -network)
function 1)
To
2 - 45ms
Nominal transmission time
(propagation time not included)
Tac
2 - 65 ms
Maximum actual transmission time
under disturbed channel conditions for a defined
dependability and signal to noise ratio or BER.
(propagation time not included)
Tpac
12 - 125 ms
Maximum actual protection operating time time
under disturbed channel conditions for a defined
dependability and signal to noise ratio or BER.
(propagation time not included)
Notes:
1) Including the physical medium (cable, fibre) and the telecommunication intermediate- and terminal equipment
2) 0 ms applies when interface (b) is connected back to back. The propagation delay depends on the route length and on the number and type
of intermediate and terminal equipment involved.
5 ms may be difficult to achieve for networks. However, network latency will normally be offset by short times in the teleprotection receive
function (typ. 2 … 10 ms) for digital systems operating at 64 kbit/s or higher, such that the requirement for the overall operating time can be
met. See note 3)
3) Typical values for analog (narrowband) teleprotection systems are in the range 10 to 30 ms
Typical values for digital (wideband) teleprotection systems operating at 64kbit/s or higher are in the range 2 to 10 ms
4) 0 ms can apply to intertripping (direct tripping equipment)
2 to 10 ms are typical for state comparison protection relays (time for phase selection and O/P circuits operation)
10 to 30 ms are typical for unit protection relays (time for signal comparison and O/P circuits operation)
Figure A1-5: Typical operating times for protection systems incorporating teleprotection
143 / 172
ANNEX A2 TELECOMMUNICATION SYSTEMS CHARACTERISTICS
Summary of transmission characteristics of various media and telecommunication systems. All values are approximate.
Propagation time Routing recovery Bit Error
Propagation time Propagation time Channel crossover Bandwidth or
symmetry Add / Drop time time / Network Rate
(from interfaces (b) to (b) in ANNEX A1) variation probability Capacity
(Differential delay) restoration time (typical)
< 1ms Not applicable low Not few kHz;
Pilot Wires Signal propagation time 5-10µs/km << 1ms Not applicable
if the same route (Pt-Pt links) (human error) applicable << 64 kbit/s
Power Line Carrier links Signal propagation time on HV line 3.3µs/km Not applicable low 4 … 8kHz;
<< 1ms < 1ms Not applicable < 10-3
(High Voltage Lines) (+ ~1.5ms for each PLC terminal equipment) (Pt-Pt links) (human error) < 64kbit/s1
Signal propagation time in air 3.3µs/km < 1ms Not applicable low
Microwave Links. << 1ms Not applicable < 10-3 > 64kbit/s
(+ ~1…2ms for each terminal equipment) if the same route (Pt-Pt links) (human error)
< 1ms low
Fibre Optic Cables Signal propagation time in fibre cable ~5µs/km << 1ms Not applicable Not applicable < 10-6 > 64kbit/s
if the same route (human error)
Signal round trip time 250-280ms
GEO Satellites No data available No data available Not applicable No data available No data available < 10-3 > 64kbit/s
(up + down)
Signal round trip time ~100ms -3
MEO Satellites No data available No data available Not applicable No data available No data available < 10 > 64kbit/s
(up + down)
Signal round trip time 10…30ms
LEO Satellites >> 1ms >> 1ms Not applicable No data available No data available < 10-3 > 64kbit/s
(up + down)
Signal propagation time in cable ~5µs/km exists
PCM cable links < 1ms < 0.1ms Not applicable Not applicable < 10-6 > 64kbit/s
+ max. 0.6ms per 64kbit/s to 2Mbit/s Multiplexer (Sync. failure)
Signal propagation time in cable 5µs/km
+ max. 0.6ms per 64 kbit/s to 2Mbit/s Mux exists
PDH networks < 1ms < 1ms ~0.6ms ~15min < 10-6 > 64kbit/s
+ 15µs per 2/8 Mbit/s Mux (Sync. failure)
+ 1µs per repeater
Signal propagation time in cable ~5µs/km ~ 1ms for single
< 1ms with < 120µs per
+ 35µs for 2Mbit/s port to STM1 link failure; exists
SDH networks < 3ms typical bidirectional ADM or < 10-6 > 64kbit/s
+ 40µs STM1 aggregate depending on (Sync. failure)
protection repeater
+ 110µs STM1 to 2 Mbit/s port system vendor
Signal propagation time in cable ~5µs/km
+ 1 ms processing time ATM Edge Mux
+ 6 ms packetization delay for 64kbit data
< 3ms cell delay
+ 0.5ms for each ATM core switch same as SDH if Cell misinsertion
variation (CDV) for (Similar to
ATM networks Note: Normally, the QoS parameter for Maximum No data available SDH is transport ratio (CMR) < 1/day < 10-6 > 64kbit/s
QoS class1 (ITU-T SDH)
Cell Transfer Delay (MaxCTD) will be defined. layer (ITU-T I.356)
I.356)
E.g., ITU-T I.356 suggests an upper bound on the
CTD of 400ms for an international ATM
connection.
Non-deterministic; Critical; exists > 64kbit/s
IP networks No guarantee Not applicable Not applicable < 10-5
No guarantee No guarantee (Routing error) on demand
5…. 15ms shared hub / 1… 2ms switched hub Few ms; exists
Ethernet 10MB LAN No data available Not applicable Not applicable < 10-5 > 64kbit/s
+ 6 ….12ms WAN time No guarantee (addressing error)
1….. 3ms shared hub / < 1ms switched hub Few ms; exists -5
Ethernet 100MB LAN No data available Not applicable Not applicable < 10 > 64kbit/s
+ 6 …12ms WAN time No guarantee (addressing error)
1
For voice and data only. For protection signal transmission, the capacity is sufficient for binary protection commands (state comparison schemes) or for non-segregated phase comparison applications
(unit schemes).
PROTECTION USING TELECOMMUNICATIONS
CIGRE JWG 34/35.11
Quality of Service is something that is often talked about as an important user requirement, but
in the past little has been done in the standards area to give users any real influence over the
QoS they may be able to obtain for the services they require. Typically, service characteristics
are fixed when systems are built or when communications services are subscribed to, after
which there is not much that users can do. OSI network and transport layer protocols allow
limited signaling of QoS requirements, but in practice, they offer little more than the ability to
choose throughput classes when X.25 is used.
However, this situation is changing. Real-time applications can differ enormously in their
requirements for throughput and transit delay. Power network protection has extremely stringent
requirements for delivery within known time-windows, and will often need to use the same
communication network as other traffic. Therefore, the demand is growing for power utility users
to be able to state or negotiate the QoS they need.
Much of the work on the dynamic treatment of QoS is still at the research stage. QoS
mechanisms are being developed for time-critical communications, the Internet, multi-media
communications and so on. ITU-T and ISO/IEC are attempting to help in all this by developing
some common concepts and terminology (so that not everything is called a QoS parameter),
and by providing a central place where QoS methods and mechanisms can be published.
In the following paragraphs, a general introduction into the concept of QoS is given, followed by
a more detailed discussion regarding its application for ATM, where the concept of QoS has
been consistently adopted from the beginning.
QoS Parameters
In the common case, everything related to the desired quality of the traffic can be referred to as
Quality of Service parameters. One may distinguish between user-level QoS, application-level
QoS, system level QoS and at even lower levels. Parameters considered here relate to the
network.
Services may be broadly categorized in a qualitative manner into the following service classes
or service categories:
- Deterministic
Typical use is for "hard" real-time applications
- Statistical
Typical use is for "soft" real-time applications
- Best effort
Everything else, no guarantees are made
This crude approximation will probably not be sufficient in many cases. Thus, the following
quantitative QoS parameters may be specified:
146 / 172
PROTECTION USING TELECOMMUNICATIONS
CIGRE JWG 34/35.11
- Throughput can be based both on average data rate and/or peak data rate. The ratio of
peak rate and average rate of data streams is known as burstiness.
- Reliability relates to a certain probability of data loss which can be tolerated
- Delay can be specified based on an absolute or probabilistic bound.
- Delay variation or Jitter is the (short-term) variation in delay a message experiences.
Parameters are static if they are valid for the entire duration of the connection. If they can be
changed while a transmission is in progress, they are said to be dynamic.
An ATM Service Category (ATM Forum name) or ATM Transfer Capability (ITU-T name) is
intended to represent a class of ATM connections that have homogeneous characteristics in
terms of traffic pattern, QoS requirements and possible use of control mechanisms, making it
suitable for a given type of network resource allocation. The ATM-Forum has split the Service
Categories into real-time traffic (CBR and rt-VBR) and non-real-time traffic (nrt-VBR, ABR and
UBR). In the ITU-T, real-time and non-real-time are included in the QoS classes rather than in
the ATM Transfer Capabilities. The ATM-Forum on the other hand permits the use of the ITU-T
QoS classes, thus the differences are more apparent than real.
In the rest of this document, the service categories are addressed based on the ATM Forum
"Traffic Management Specification" only.
147 / 172
PROTECTION USING TELECOMMUNICATIONS
CIGRE JWG 34/35.11
Traffic Parameters
A source traffic parameter describes an inherent characteristic of a source. The following
parameters are considered for the purpose of defining the Service Categories :
- Peak Cell Rate (PCR)
- Sustainable Cell Rate (SCR)
- Maximum Burst Size (MBS) and Burst Tolerance (BT)
- Minimum Cell Rate (MCR)
- Cell Delay Variation Tolerance (CDVT)
- QoS Parameters
The traffic contract defines how the network should react when parameters that characterize the
traffic are exceeded. A traffic contract may be established either when the network user first
subscribes to a network service, or dynamically via user interface signaling or network
management negotiation.
QoS Parameters
The QoS parameters selected to correspond to a network performance objective may be
negotiated between the end-systems and the network, e.g., via signalling procedures, or can be
taken as default. One or more values of the QoS parameters may be offered on a per
148 / 172
PROTECTION USING TELECOMMUNICATIONS
CIGRE JWG 34/35.11
connection basis:
- Peak-to-peak Cell Delay Variation (CDV)
- Maximum Cell Transfer Delay (maxCTD)
- Cell Loss Ratio (CLR)
A number of additional QoS parameters have been identified, but their negotiation is not
foreseen but are assigned at call set-up, e.g.:
- Cell Error Ratio (CER)
- Severely Errored Cell Block Ratio (SECBR)
- Cell Misinsertion Rate (CMR).
The basic commitment made by the network is that once the connection is established, the
negotiated QoS is assured to all cells conforming to the relevant conformance tests. It is the end
station's responsibility to send only traffic that is compliant with the contract (PCR). The network
checks the traffic against the contract, and noncompliant cells are discarded.
149 / 172
PROTECTION USING TELECOMMUNICATIONS
CIGRE JWG 34/35.11
Since the transmission of protection signals is extremely time sensitive, non-real-time VBR is
not applicable for teleprotection.
Although no specific QoS parameter is negotiated with the ABR, it is expected that an end-
system that adapts its traffic in accordance with the feedback will experience a low Cell Loss
Ratio (CLR) and obtain a fair share of the available bandwidth according to a network specific
allocation policy. Cell Delay Variation (CDV) is not controlled in this service, although admitted
cells are not delayed unnecessarily.
Since ABR service is not (as specified at present) intended to support real-time applications and
as no specific QoS parameters are negotiated, the ABR service category is not applicable to
protection signal transmission.
As UBR service does not specify traffic related service guarantees, it is not applicable for
protection signal transmission.
The Table below summarizes Service Category Attributes and QoS Guarantees.
150 / 172
PROTECTION USING TELECOMMUNICATIONS
CIGRE JWG 34/35.11
QoS Parameters
CMR maxCTD
CER CLR CDV
Cell Maximum
Cell Error Cell Loss Cell Delay
Misinsertion Cell Transfer
Ratio Ratio Variation
Ratio Delay
Propagation
X
Link / network /
Time
parameters
Propagation
Time X X
medium
Variation
Bit Errors /
X X X
Media Errors
Switch
X X X
Architecture
ATM specific
Buffer
X X X
Capacity
Traffic Load /
X X X X
Resource
(except CBR) (except CBR) (except CBR) (except CBR)
Allocation
Number of
X X X X X
Nodes / Hops
network
General
design
Network /
Hardware X
Failures
The following Table shows the expected impact of QoS parameters onto general
communication performance parameters at interface (b) in the Figures in ANNEX A1, and their
possible adverse impact onto the (tele)protection function. It is noted that the table is
speculative as little experience yet exists with protection signal transmission over ATM.
151 / 172
PROTECTION USING TELECOMMUNICATIONS
CIGRE JWG 34/35.11
Communication performance
(Tele-)Protection parameters
parameters
BER Transmission
Jitter Dependability Security
Bit Error Rate Time
CER
X X X X
Cell Error Ratio
CLR
X X X
ATM QoS parameters
APPLICATION AREA
CBR rt-VBR nrt-VBR ABR UBR
ê
The ratings (optimum - good - fair - not suitable) refer to the efficiency/cost advantages the use
of ATM may have for the stated application areas. The ratings given for protection signal
transmission are speculative and apply subject to the condition that native ATM interfaces are
available and that the requirements for the end-to-end signal propagation time can be fulfilled
(see Figure A1-5).
The Integrated Services model is based on the resource reservation paradigm. Before data
152 / 172
PROTECTION USING TELECOMMUNICATIONS
CIGRE JWG 34/35.11
are transmitted, the applications must set-up a path and reserve the resources. This working
principle resembles the one used in circuit switched networks therefore being adequate for non-
elastic applications such as voice telephony, or Protection communication in the future. The
complete implementation of this architecture requires QoS aware applications or the addition of
Gateways between the legacy applications and the Integrated Services core since the network
has to be informed about the profile of the traffic offered and the QoS requirements of the user.
Differentiated Services is based on the definition of different classes of services. The packets
are marketed differently depending on the service class their application/flow belongs to.
Therefore, Differentiated Services is essentially an evolution of the static-priority scheme.
Whereas Int-serv architecture guarantee and End-to-End QoS, that is to say, application-to-
application, the Diff-serv architecture guarantees the QoS only in its own domain.
The provision of QoS for the Teleprotection application is a must, since both the bandwidth and
the delay of the virtual channel established throughout the network to support the protection
relay communication has to be guaranteed in a deterministic way.
Existing protection relays do not include IP Ethernet interface; therefore, we have to focus on
the new and evolving technologies. In this field, the new Utility Communication Architecture
UCA is the most relevant example. The UCA architecture is based on the use of standard
protocol stacks. Two tracks with different profiles have been defined including both the ISO and
the TCP/IP approaches.
- Generic Object Models for Substation and Feeder Equipment, (GOMSFE) which defines
a set of object models for use across a broad range of typical utility devices;
- Generic Object Oriented Substation Event, (GOOSE) which allows a device to broadcast
status information on the local segment;
- Common Application Service Models, (CASM) which defines a standardized set of
abstract services supporting the UCA object models, as well as the methods of mapping
the services to the Manufacturing Message Services (MMS).
None of these application elements have been designed to specify their QoS requirements to
the network. Therefore, the provision of Teleprotection service will require static QoS
requirements that will have to be introduced in the Network Management Centre.
The first one is used to support those applications that are non-tolerant to uncontrolled delays
and/or losses. The second is used to support elastic applications, that is to say, applications
that can control the traffic flow that they are offering to the network and therefore can tolerate
some changes in delay and throughput, whereas that the third one is used by those applications
that do not require QoS.
Teleprotection service is associated with the Guaranteed Service class. Nevertheless, special
153 / 172
PROTECTION USING TELECOMMUNICATIONS
CIGRE JWG 34/35.11
care has to be taken to verify that the network is providing deterministic guarantees. To achieve
this, the network architecture requires a set of components to be provided.
The principle of QoS assurance is based on an interaction between the user and the network.
This interaction is expressed by means of a Traffic Contract or agreement that includes the
commitments of both parties.
The total delay has two parts: a fixed delay caused by the transmission delay of the path and a
queuing delay caused by the intermediate nodes. The fixed delay depends only on the chosen
path and is not determined by the QoS mechanism but by the setup mechanism. The queuing
delay is determined and controlled by the QoS mechanism provided by the network. The
queuing delay is primarily a function of two parameters the token bucket size and the data rate.
These two values are under the application control, and therefore, the application can estimate
the delay and if it is larger than required, the bucket size and the rate can be modified to
achieve a lower delay.
The end-to-end QoS is based on an assured bandwidth provided by the network that, when
used by a shaped flow, produces a delay bound service with no queuing loss. This service
scheme can only control the maximal queuing delay without providing any kind of control on the
jitter since the delay will change from the transmission delay of the path to the transmission
delay plus the queuing delay.
The traffic profile is specified by means of the Traffic Specification or TSpec whereas that the
QoS requirements are specified by means of the Service Request Specification or RSpec. Both
specifications form the two parts of the Traffic Contract.
TSpec defines the flow’s traffic pattern allowed in terms of the average packet rate, maximum
burst rate and size, and the packet size. It has to be considered that these parameters define
the maximum allowed not the actual traffic profile. Excess traffic could be directly discarded or
transmitted as Best-effort depending on the traffic policy of the network.
RSpec specifies the QoS a flow requires. That is to say, the bounded maximum End-to-End
delay expressed in this case by means of the bandwidth reservation required by the flow
defined by means of TSpec. The network should reserve enough resources to guarantee that
no losses due to network congestion will ever occur. A detailed specification of the QoS
parameters including formats and range of values can be found in the RFC 2212 “Specification
for Guaranteed Quality of Service”. The same document also describes internal network
architecture to achieve end-to-end QoS.
TSpec and RSpec are calculated by a QoS reservation algorithm embedded in the application.
The algorithm takes into account the actual QoS requirement and the propagation delay of the
path to carry out the calculation of the TSpec and RSpec parameters That once accepted by the
admission control will be delivered to the network elements.
Other QoS aspects such as service availability are not defined in the Traffic Contract. They
have to be achieved by means of the proper network design.
154 / 172
PROTECTION USING TELECOMMUNICATIONS
CIGRE JWG 34/35.11
Although IP networks can offer deterministic guarantees to those flows that require it, only the
maximum end-to-end delay can be controlled. The difference between the propagation delay
and the bounded delay that includes the queuing delay cannot be controlled, thereby obtaining
a considerable delay jitter that can impair the global quality of the virtual connection. This jitter
could be increased by the imprecision of the queue schedulers in the packet switches. That is to
say, the algorithm that controls the process of packet switching can only offer the calculated
performance for infinitesimal short packets. The longer the packets the bigger the imprecision in
the delay control. It has to be considered that the packet length of any other flow switched in the
same node will affect the delay jitter of our flow. Due to this, the use of IP networks to support
Teleprotection services should be limited to well-controlled domains in which all the above
mentioned factor fall into our control.
ATM technology, which is based on a short and fix packet length called cell, can be envisioned
as feasible solution to support the Teleprotection service since it can guarantee and effectively
control both the delay and the delay variation.
The combination of IP technology that offers cost-effective access interfaces and the ATM
technology that offers network wide reliable delay control might probably be one future
approach to support the Teleprotection service in the broadband environment.
Lit:. [31], [32], [33], [34], [35], [36].
In order to achieve this goal, the devices that interconnect the IP and the ATM subnetworks
have to include, among others, the capability of translating every service aspect as well as QoS
parameters in order to assure an end-to-end QoS.
Due to the different service definition in both networks the services are mapped according to the
155 / 172
PROTECTION USING TELECOMMUNICATIONS
CIGRE JWG 34/35.11
following association:
The details of service mapping as well as the QoS and traffic parameters could be found in the
RFC 2381. “Interoperation of Controlled-Load Service and Guaranteed Service with ATM”, [36].
Traffic and QoS parameters are defined in the IP environment in terms of bytes/s whereas that
in ATM are defined in cells/s. The corresponding mathematical transformations that takes into
account overhead introduced by the different size of IP and ATM headers can be found in RFC
2381, [36]. Since these functions are included in the standards, they are always included in the
Gateways that interconnect IP and ATM networks.
ITU-T RECOMMENDATION
ISO/IEC
No. TITLE EQUIVALENT
156 / 172
PROTECTION USING TELECOMMUNICATIONS
CIGRE JWG 34/35.11
Figure 8.3-1: Two ways of timing synchronization for current differential teleprotection
In the round-trip transmission method shown in Figure 8.3-2(a), a reference timing pulse at the
master terminal is transmitted to the slave terminal. The transmitted reference pulse is returned
to the master terminal. The returned reference pulse is delayed by round-trip transmission
through the outgoing and incoming transmission lines (δ1 and δ2). Transmission delay is
measured at the master terminal, and the data is transmitted to the slave node. The slave node
executes delay compensation corresponding to a half of the round-trip delay, (δ1 + δ2)/2 to
achieve timing synchronization.
157 / 172
PROTECTION USING TELECOMMUNICATIONS
CIGRE JWG 34/35.11
In the mutual or two-way transmission method, both terminals mutually transmit reference
pulses. Each terminal measures the time difference between the transmission of its own pulse
and the reception of the opposite terminal's pulse; TM at the master terminal and TS at the
slave terminal. TM is transmitted to the slave terminal which executes delay compensation
corresponding to a half of the difference between the two delays, (TM - TS)/2. The delay
compensation is initiated upon reception of the master node's pulse by the slave terminal. A
synchronization error of a few microseconds between two PDH-based synchronization devices
was experimentally obtained in multi- (four or five) repeater microwave.
Figure 8.3-3 shows another implementation. A terminal acts as the reference clock for the
system. A numbered message is sent from the synchronizing terminal at time tA1. It is received
at time tB1’ at the reference terminal and returned back at time tB2. It is received at the
synchronizing terminal at time tA2’. The times tB1’ and tB2 are sent with the next message to the
synchronizing terminal. The difference ∆t between the clocks in the synchronizing and the
reference terminal can now be calculated by the synchronizing terminal as
t A1 + t A2' t B1' + t B 2
∆t = −
2 2
The clock in the synchronizing terminal can now be adjusted by a fraction of ∆t until ∆t becomes
zero. The synchronizing and reference terminal clocks are synchronized and the samples of
current can be compared at the same sampling instant. Since the clocks are crystal controlled,
they maintain synchronism for long times of transmission interruptions [16].
Another implementation is shown in Figure 8.3-4. In this case the terminals also use the same
data polling technique as described above for the measurement of the channel delay time.
Every terminal calculates the time delay δ with regard to the other ones as
158 / 172
PROTECTION USING TELECOMMUNICATIONS
CIGRE JWG 34/35.11
(t A2' − t A1 ) − (t B 2 − t B1' )
δ ≡ δ1 = δ 2 =
2
With the measurement of the time delay, the local sampling timing can be adjusted as
t AB 2 = t A2 − δ .
Although this method can achieve synchronization between the terminals, an asynchronous
operation where the internal clocks of the terminals don’t need to be synchronized can be also
performed. The sampling time of the received current vector values from the remote terminal
can be measured as tAB2. Since the current samples have not been taken at the same sampling
instant, a vector transformation in software is required to rotate the remote vector by an angle
corresponding to the time tAB2 - tA2, and then to compare with the local value sampled at tA2.
These procedures assume the same time delay δ in both directions, so in communication
systems where both directions can be switched via different routes (SDH and ATM networks)
the difference in time delay for data transfer in both directions will introduce an error in the
determination of the differential current [15], [5]. Requirements on differential time delay and
solutions are discussed in chapter 6.
There are many ways to provide precise timing signals externally. Form the viewpoint of
technological maturity and the ease of availability, the satellite-based Global Positioning System
(GPS) is a solution [17], [18]. Other satellites such as the Russian GLONASS (Global
Navigation Satellite System) are also candidates for the wide-area time dissemination.
Synchronization with GPS satellite signals is the preferred technique at the present time. Global
Positioning System using on-board atomic clocks (cesium or rubidium) consists of 24 satellites
in 12-hour orbits at an altitude of 20,183 km. There are six orbits used with 4 satellites in each
orbit. Using the transmissions from these satellites, positions of objects can be determined with
an accuracy of 10 meters in three dimensions, and in the common-view time transmission
provided by these satellites, 1-pulse-per-second (1-pps) signals at any location in the world with
an accuracy of about 1 µs (basic time synchronization accuracy is ±20 ns) are available when
159 / 172
PROTECTION USING TELECOMMUNICATIONS
CIGRE JWG 34/35.11
A variety of alternatives exist for time synchronization using a terrestrial signal from a central
location. AM radio broadcasts are least expensive, but their accuracy is limited to a few
milliseconds. An access to reference time server using UNIX-based NTP (network time
protocol) via TCP/IP networks or Internet is less accurate. Utilities can use their own private
telecommunication channels such as microwave or fiber-optic circuits where the solution may
approach 1 µs, and custom or dedicated fiber-optic links may achieve better accuracy.
In terms of future use by utilities of broadband digital communications, SDH networks, which are
presently master-slave frequency synchronous networks, appear promising for a terrestrial time
synchronous system. Terrestrial SDH-based time synchronous system of which accuracy is
comparable with GPS is under study in several organizations [20], [21]. Current SDH networks
are equipped with clock supplies to synchronize its operation clock frequency all over the
network, making it easy to handle multiplexing and demultiplexing of digital signals. In order to
time-synchronize frequency-synchronized networks of this type, externally additive time
synchronizing equipment which transmits time signals to adjacent nodes, measures round-trip
or two-way delays between the nodes, and compensates the two-way differential delay, was
proposed as shown in Figure 8.3-5, [21]. To transmit a time signal, especially reference timing
pulse in SDH networks, undefined bytes in the SDH frame overhead are used. In the system
auxiliary time synchronizing equipment (TSE) is attached to existing SDH transmission
equipment and clock supply equipment (CSE). In these systems frequency synchronization is
conducted by CSEs which usually have a digital processing phase locked loop, and phase or
time synchronization is carried out by TSE. Experimental results indicated that an accuracy of
about 1 µs can be achieved.
CSE-S
Slave
GPS stations
receivers TSE-S
S Time S S
signal SDH
Time
Power Control and Protection System signal
SDH: SDH Transmission Equipment (existing)
CSE: Clock Supply Equipment (existing)
TSE: Time Synchronous Equipment
M: Master, S: Slave
160 / 172
PROTECTION USING TELECOMMUNICATIONS
CIGRE JWG 34/35.11
LIST OF FIGURES
FIGURE 2.1-1: SINGLE-LINE DIAGRAM OF A TYPICAL POWER STATION ........................................................................9
FIGURE 2.1-2: SINGLE LINE DIAGRAM OF A TYPICAL TRANSFORMER STATION ..........................................................10
FIGURE 2.1-3: THE SCANDINAVIAN POWER GRID .....................................................................................................11
FIGURE 2.2-1: POWER LINE WITH EXAMPLES OF FAULT TYPES AND FAULT POSITIONS ..............................................12
FIGURE 2.4-1: TYPICAL POWER SYSTEM AND ITS ZONES OF PROTECTION ..................................................................16
FIGURE 2.4-2: OVERLAPPING PROTECTION ZONES ESTABLISHED BY CURRENT TRANSFORMER LOCATION ................17
FIGURE 2.4-3: FAULT CLEARING SYSTEM ..................................................................................................................18
FIGURE 2.5-1: FUNDAMENTAL TERMS ON PROTECTION AND TELEPROTECTION (FROM IEC60834-1) .......................20
FIGURE 3.1-1: PRINCIPLE OF DIFFERENTIAL PROTECTION..........................................................................................23
FIGURE 3.1-2: DIFFERENTIAL PROTECTION: EXAMPLE OF PERCENTAGE RESTRAINT CHARACTERISTIC .....................23
FIGURE 3.1-3: BASIC SCHEME OF A CURRENT BALANCED SYSTEM USING THREE PILOT WIRES ..................................25
FIGURE 3.1-4: CENTRALIZED CONFIGURATION .........................................................................................................27
FIGURE 3.1-5: DISTRIBUTED CONFIGURATION ..........................................................................................................27
FIGURE 3.1-6: PHASE COMPARISON OPERATING PRINCIPLES .....................................................................................29
FIGURE 3.1-7: OPERATION OF CHARGE COMPARISON, EXTERNAL FAULT ..................................................................31
FIGURE 3.1-8: BIAS CHARACTERISTIC OF CHARGE COMPARISON...............................................................................32
FIGURE 3.1-9: IDEAL POLAR DIAGRAM CHARACTERISTIC ..........................................................................................32
FIGURE 3.1-10:INTERTRIPPING UNDERREACH DISTANCE PROTECTION SCHEME LOGIC.............................................35
FIGURE 3.1-11:PERMISSIVE UNDERREACH DISTANCE PROTECTION SCHEME LOGIC .................................................36
FIGURE 3.1-12:PERMISSIVE OVERREACH DISTANCE PROTECTION SCHEME LOGIC ....................................................37
FIGURE 3.1-13:ACCELERATED UNDERREACH DISTANCE PROTECTION SCHEME LOGIC .............................................38
FIGURE 3.1-14:BLOCKING OVERREACH DISTANCE SCHEME LOGIC ...........................................................................40
FIGURE 3.1-15:DEBLOCKING OVERREACH DISTANCE PROTECTION SCHEME LOGIC .................................................41
FIGURE 3.2-1: TWO BREAKER BUSBAR CONFIGURATION ...........................................................................................42
FIGURE 3.2-2: 1½ BREAKER BUSBAR CONFIGURATION .............................................................................................44
FIGURE 3.2-3: TWO PROTECTION ZONES / ONE BREAKER BUSBAR CONFIGURATION ..................................................46
FIGURE 3.3-1: GENERATOR PROTECTION ..................................................................................................................47
FIGURE 3.3-2: TRANSFORMER PROTECTION ..............................................................................................................48
FIGURE 3.3-3: REACTOR PROTECTION .......................................................................................................................48
FIGURE 3.4-1: RELATIONSHIP BETWEEN PROTECTED AREA AND OPERATE TIME WITH RESPECT TO PROTECTION
SCHEMES 49
FIGURE 3.4-2: DISTANCE PROTECTION PROVIDING REMOTE BACKUP ........................................................................50
FIGURE 3.4-3: SPLITTING PROTECTION (BD) USING TELECOMMUNICATIONS FOR MULTI-CIRCUIT AND MULTI-
TERMINAL LINE. RY, CB AND TD DENOTE OPERATING TIMES OF RELAY (30 MS) AND CB (40 ............................50
FIGURE 3.4-4: COORDINATION TIME CONTROL USING TELECOMMUNICATIONS. RY, CB AND TD DENOTE OPERATING
TIMES OF RELAY (30 MS) AND CB (40 MS) AND TIME DELAY FOR COORDINATION, RESPECTIVELY. ....................51
FIGURE 3.4-5: WIDE-AREA CURRENT DIFFERENTIAL BACK-UP PROTECTION EMPLOYING TELECOMMUNICATIONS ....52
FIGURE 3.4-6: A SYSTEM-WIDE PROTECTION; PREDICTIVE OUT-OF-STEP PROTECTION .............................................54
FIGURE 4.4-1: PRINCIPLE OF WAVELENGTH DIVISION MULTIPLEXING FOR 2 WAVELENGTHS, ................................70
FIGURE 4.5-1: NETWORK ARCHITECTURE.................................................................................................................76
FIGURE 4.5-2: NETWORK COMPONENTS ....................................................................................................................77
FIGURE 4.5-3: SEVEN LAYER OSI MODEL .................................................................................................................78
FIGURE 4.5-4: REFERENCE MODEL OF THE CIRCUIT EMULATION SERVICE (CES).....................................................81
FIGURE 4.5-5: LAN TOPOLOGIES .............................................................................................................................83
FIGURE 4.5-6: LAN PROTOCOL LAYERING ................................................................................................................84
FIGURE 6.1-1: INAPPROPRIATE OVERLAPING OF RELAY COMMUNICATION LINKS IN A DOUBLE REDUNDANT
PROTECTION SYSTEM .........................................................................................................................................111
FIGURE 8.1-1: LOCAL AND WIDE AREA NETWORKS FOR PROTECTION .....................................................................131
FIGURE 8.1-2: INTEGRATED SUBSTATION APPLICATIONS DEALT IN UCA ARCHITECTURE.......................................132
FIGURE 8.1-3: SUBSTATION LANS CONNECTED BY A WAN ...................................................................................134
FIGURE 8.2-1: SUBSTATION WITH LAN CONFIGURATION .......................................................................................135
FIGURE 8.2-2: HV (SUB)NETWORK WITH WAN......................................................................................................136
FIGURE 8.3-1: TWO WAYS OF TIMING SYNCHRONIZATION FOR CURRENT DIFFERENTIAL TELEPROTECTION ............157
FIGURE 8.3-2: TWO-TYPES OF TIMING PULSE TRANSMISSION METHODS ..................................................................158
161 / 172
PROTECTION USING TELECOMMUNICATIONS
CIGRE JWG 34/35.11
162 / 172
PROTECTION USING TELECOMMUNICATIONS
CIGRE JWG 34/35.11
LIST OF TABLES
TABLE 3.1-1: STATE COMPARISON PROTECTION SCHEMES .....................................................................................34
TABLE 4.3-1: ADVANTAGES AND DISADVANTAGES OF PILOT WIRES .......................................................................60
TABLE 4.3-2: ADVANTAGES AND DISADVANTAGES OF POWER LINE CARRIER LINKS................................................62
TABLE 4.3-3: ADVANTAGES AND DISADVANTAGES OF RADIO LINKS .......................................................................65
TABLE 4.3-4: ADVANTAGES AND DISADVANTAGES OF OPTICAL FIBRE LINKS ..........................................................67
TABLE 4.3-5: ADVANTAGES AND DISADVANTAGES OF SATELLITE LINKS.................................................................69
TABLE 4.4-1: PDH - PLESIOCHRONOUS DIGITAL HIERARCHY LEVELS ....................................................................72
TABLE 4.4-2: SDH - SYNCHRONOUS DIGITAL HIERARCHY LEVELS ........................................................................73
TABLE 5.3-1: SERIAL DATA INTERFACES .................................................................................................................95
TABLE 5.3-2: COMMON PHYSICAL LAN INTERFACES ..............................................................................................98
TABLE 6.1-1: REQUIREMENTS FROM PROTECTION ON TELECOMMUNICATION AND TELEPROTECTION: STATE
COMPARISON SCHEMES. FOR TERMS AND DEFINITIONS REFER TO CHAPTERS 6.1.1.1 AND 6.1.1.2. ...................106
TABLE 6.1-2: REQUIREMENTS FROM PROTECTION ON TELECOMMUNICATION AND TELEPROTECTION: ANALOG
COMPARISON SCHEMES. FOR TERMS AND DEFINITIONS REFER TO CHAPTERS 6.1.1.1 AND 6.1.1.2. ...................107
TABLE 6.4-1: IEC PUBLICATIONS FOR EMC AND INSTALLATION ..........................................................................118
TABLE 7.1-1: PROTECTION SCHEMES VS. MEDIA...................................................................................................120
TABLE 7.1-2: PROTECTION SCHEMES VS. MULTIPLEXING TECHNIQUES ................................................................121
TABLE 7.1-3: PROTECTION SCHEMES VS. NETWORK TECHNOLOGIES ....................................................................122
TABLE 7.1-4: CONFIGURATION SUMMARY .............................................................................................................123
TABLE 7.2-1: CHECKLIST FOR INTERFACE CO-ORDINATION BETWEEN PROTECTION / TELEPROTECTION /
TELECOMMUNICATION DEVICES ........................................................................................................................127
TABLE 8.3-1: TSPEC PARAMETERS ........................................................................................................................155
TABLE 8.3-2: RSPEC PARAMETERS ........................................................................................................................155
163 / 172
PROTECTION USING TELECOMMUNICATIONS
CIGRE JWG 34/35.11
BIBLIOGRAPHY
[1] CIGRE SC34 WG34-35.05, "Protection systems using telecommunications”, TB 13,
1987.
[2] CIGRE SC34 WG34.05, "Application of wide-band communication circuits to protection -
prospects and benefits”, TB 84, 1991.
[3] CIGRE SC34 WG34.01, "Reliable Fault Clearance and Back-up Protection", TB 140,
April 1999.
[4] T. Nagasawa and et al., "Present Situation and Experiences of Back-up Protection in
Japanese EHV Networks", CIGRE SC34, South Africa, 1997.
[5] Y. Serizawa, et al., “Wide-band communication requirements for differential
teleprotection signaling” 600-03, CIGRE Symposium Helsinki 1995.
[6] Y. Serizawa, et al., "Wide-Area Current Differential Backup Protection Employing
Broadband Communications and Time Transfer Systems", IEEE PES 1998 Winter
Meeting, PE-203-PWRD-0-11-1997, Tampa, 1998.
[7] T. Nagasawa, et al., "Present Status and Experiences in Grouping of Protection
Functions in Integrated Systems", 1999 CIGRE SC34 Colloquium, 108, Florence, Italy,
October 1999.
[8] J. Kobayashi, et al., "The State of the Art of Multi-circuit and Multi-terminal Overhead
Transmission Line Protection Systems Associated with Telecommunication Systems",
CIGRE, Paris, 34-203, 1990.
[9] CIGRE SC34 WG34.02, "Adaptive Protections and Control", 1995.
[10] Y. Ohura, et al., "A Predictive Out-of-Step Protection System Based on Observation of
the Phase Difference between Substations", IEEE Trans. Power Delivery, Vol. 5, No. 4,
1990.
[11] M. Tsukada, et al., "New Stabilizing Protection Systems with an Adaptive Control
Approach", 34-204, CIGRE SC34 Colloquium, Stockholm, 1995.
[12] "Wavelength Division Multiplexing for Electricity Utilities"; TB 131 to be published.
[13] CIGRE SC35 WG35.07, "Power System Communications in the High Speed
Environment", TB 107, December 1996.
[14] ATM Forum af-saa-0032.000, “Circuit Emulation Service Interoperability Specification”,
September 1995.
[15] C.G.A Koreman et al., "Requirements for SDH networks due to protection signalling”
400-02, Cigré Symposium Helsinki 1995.
[16] T. Einarsson et al., "Experiences of current differential protections for multi-terminal
power lines using multiplexed data transmission systems” 34-203, Cigré Session 1994.
[17] W. Lewandowski and C. Thomas, "GPS Time Transfer", Proc. IEEE, Vol. 79, No. 7,
1991.
[18] R. E. Wilson, "Use of Precise Time and Frequency in Power Systems", Proc. IEEE, Vol.
79, No. 7, 1991.
[19] IEEE Std 1344-1995, "IEEE Standard for Synchrophasors for Power Systems", IEEE
Power Engineering Society, 1996.
[20] M. Kihara and A. Imaoka, "System configuration for standardizing SDH-based time and
frequency transfer", European Frequency and Time Forum, No.418, pp. 465-470, 1996.
[21] Y. Serizawa et al., "SDH-Based Time Synchronous System for Power System
Communications", IEEE Trans. Power Delivery, Vol. 13, No.1, Jan. 1998.
[22] K. Yanagihashi et al., "Applications of co-ordinated control, protection and operation
support system in EHV substations", CIGRE SC34, Paris, 1996.
[23] "Utility Communication Architecture: Substation Integrated Protection, Control and Data
Acquisition: Requirements Specification", RP3599-01, EPRI, 1996.
[24] J. T. Tengdin, et al., "LAN Congestion Scenario and Performance Evaluation", IEEE
164 / 172
PROTECTION USING TELECOMMUNICATIONS
CIGRE JWG 34/35.11
165 / 172
PROTECTION USING TELECOMMUNICATIONS
CIGRE JWG 34/35.11
ABBREVIATIONS
166 / 172
PROTECTION USING TELECOMMUNICATIONS
CIGRE JWG 34/35.11
FM Frequency Modulation
FR Frame Relay
GEO Geosynchronous Earth Orbit (Satellite)
GI Graded Index (optical fibres)
GLONASS Global Navigation Satellite System
GOMSFE Generic Object Models for Substation and Feeder Equipment
GOOSE Generic Object Oriented Substation Event
GPS Global Positioning System
GSM Global System Mobile
HV High Voltage
Hz Hertz
IEC International Electrotechnical Commission
IED Intelligent Electronic Device
IEEE The Institute of Electrical and Electronics Engineers
IETF Internet Engineering Task Force
Int-serv Integrated services
IP Internet Protocol
ISDN Integrated Services Digital Network
ISO International Standards Organization
ITU International Telecommunications Union
kbit/s kilobits per second
LAN Local Area Network
LD Laser Diode
LED Light Emitting Diode
LEO Low Earth Orbit (Satellite)
MAN Metropolitan Area Network
MAU Media Attachment Unit
Mbit/s Megabits per second
MBS Maximum Burst Size
MCM Multi-Carrier Modulation
MCR Minimum Cell Rate
MDT Mean Down Time
MEO Medium Earth Orbit (Satellite)
MM Multi-Mode (optical fibres)
MMS Manufacturing Message Services
MODEM Modulator - Demodulator
MUT Mean Up Time
NTP Network Time Protocol
OPGW Optical Ground Wire
OSI Open Systems Interconnection
PCM Pulse Code Modulation
PCR Peak Cell Rate
PDH Plesiochronous Digital Hierarchy
PEP Peak Envelope Power
PES Power Engineering Society (of IEEE)
PLC Power Line Carrier (equipment)
POTS Plain Old Telephone Service (System)
PSK Phase Shift Keying
PTO Public Telephone Operator
QAM Quadrature Amplitude Modulation
QoS Quality of Service
167 / 172
PROTECTION USING TELECOMMUNICATIONS
CIGRE JWG 34/35.11
168 / 172
PROTECTION USING TELECOMMUNICATIONS
CIGRE JWG 34/35.11
INDEX
2 D
2-wire circuit .....................................................57, 59 data integrity..........................................................101
definition ...........................................................105
4
datagram ..................................................................82
4-wire circuit .....................................................57, 59 datagram networks...................................................81
deblocking .........................................................30, 41
A deblocking overreach distance protection ...............41
accelerated underreach distance protection .............38 dedicated protection ring
adaptive protections.................................................53 SDH/SONET.......................................................74
addressing............................................77, 87, 92, 106 delay ......................................... See propagation time
of terminal equipment .................................69, 102 delay compensationSee propagation time
analog comparison protection..................................21 compensation
analogue circuits......................................................57 dependability ...............................................33, 55, 86
analogue communication systems ...........................56 definition ...........................................................104
ATM67, 71, 80, 86, 89, 103, 129, 133, 137, 146, 147, differential delay...... See propagation time symmetry
151, 152, 155 differential protection ........................................47, 58
ATM networks ........................................................89 digital circuits ..........................................................57
attenuation ...............................................................59 digital communication systems ...............................56
auto-reclosing ..........................................................22 digital hierarchies
availability .................................................58, 87, 101 PDH, SDH...........................................................72
directional distance relay.........................................33
B directional overcurrent relay....................................33
back-up protection......... 35, 38, 40, 46, 47, 49, 51, 52 diversity...................................................................57
bandwidth ................................................................55 space, frequency..................................................64
definition ...........................................................104 DWDM
bit error rate Dense Wavelength Division Multiplex ...............70
impact om availability.......................................101 E
blocking overreach distance protection ...................39
boosting ...................................................................61 echo logic ................................................................38
bridge.......................................................................85 EDFA
erbium doped fibre amplifier...............................66
C electric power system ................................................9
carrier frequency range............................................60 EMC
CDM Electromagnetic Compatibility............................93
code division multiplex .......................................71 installation practice ...........................................117
CDMA requirements on interfaces ..................................93
code division multiple access..............................64 error detection........................................................101
cell switched networks ............................................80 Ethernet ...........................................................96, 131
centralized timing synchronization..........................52 external timing synchronization ............................159
channel cross-over ...................................................58 F
checklist
system design ....................................................124 fading.......................................................................63
chromatic dispersion fault clearing............................................................13
optical fibres........................................................65 fault clearing system................................................17
circuit.......................................................................56 FDM
circuit switched networks ........................................79 frequency division multiplex...............................69
clock provisioning .................................................102 frequency division multiplex...............................60
contact interface ......................................................93 fibre-optic cables .....................................................65
coordinating timer ...................................................39 frequency modulation........................................26, 63
current differential protection21, 22, 74, 100, 101, FSK
157 frequency shift keying.........................................30
full-wave phase comparison ....................................30
169 / 172
PROTECTION USING TELECOMMUNICATIONS
CIGRE JWG 34/35.11
170 / 172
PROTECTION USING TELECOMMUNICATIONS
CIGRE JWG 34/35.11
interface...............................................................94 64, 67, 68, 71, 74, 75, 80, 82, 86, 89, 90, 91, 92,
pilot-wire relay ........................................................94 100, 101, 103, 104, 108, 115, 119, 128, 129,
PLC 133
analog, digital......................................................60 maloperation..............................................106, 107
channel impairments ...........................................61 multiplexing ........................................................69
coupling...............................................................61 network related............................................58, 133
modes, propagation modes..................................61 PLC related .........................................................62
power line carrier ................................................60 rented circuits......................................................56
reliability .............................................................60 re-routing.....................................................58, 101
plesiochronous.........................................................72 security related ..................................................105
power line carrier...............................................40, 41 signal crossover...................................................58
power system faults .................................................12 signal loopback ...........................58, 102, 113, 119
predictive out-of-step protection .............................53
S
propagation time29, 39, 53, 55, 58, 67, 68, 75, 86, 88,
89, 100, 104, 106, 107, 110, 115, 132, 144, 149, satellites ...................................................................67
152 saturation ...........................................................22, 24
compensation ........................ 24, 30, 115, 157, 158 SDH.................................................................88, 133
definition ...........................................................103 synchronous digital hierarchy .......................73, 78
difference ..........................................................133 security ........................................................33, 55, 86
symmetry74, 75, 86, 89, 100, 106, 107, 108, 109, definition ...........................................................105
115 self-healing
variation ...................... 68, 100, 101, 106, 107, 115 SDH/SONET.......................................................89
propagation time symmetry.....................................58 serial interface .........................................................94
definition ...........................................................103 service networks ......................................................78
propagation time variation........... 75, 81, 90, 100, 155 shared protection ring
definition ...........................................................103 SDH/SONET.......................................................74
protection signal quality ...........................................................55
communication dependent ..................................19 signal transfer delay.................................................55
communication-aided..........................................19 slips..........................................................................88
protection function SNR
introduction .........................................................18 signal-to-noise ratio.............................................55
protection operating time SONET
definition ...........................................................104 synchronous optical network...............................73
protection scheme....................................................19 splitting protection...................................................50
analog comparison ........................................19, 21 spread spectrum.......................................................71
state comparison............................................19, 33 squelching..............................................................102
protection switching stabilizing angle.......................................................29
SDH/SONET.......................................................74 stabilizing protection ...............................................53
protection system.....................................................17 standardization.......................................................138
PSK starters .....................................................................29
phase shift keying................................................63 state comparison protection .....................................33
statistical multiplexing.............................................71
Q
ATM....................................................................89
QAM synchronization......................................................102
quadrature amplitude modulation..................61, 63 synchronous transport module.................................73
system-wide protection............................................49
R
T
Radio
licensed, unlicensed ............................................63 TDM
reactor protection.....................................................48 fixed, synchronous ..............................................71
repeater ....................................................................85 statistical, asynchronous......................................71
requirements time division multiplex .................................61, 70
from wide-area protection.................................110 TDMA
re-routing .................................................................57 time division multiplex access ............................64
time coordination ..............................................101 telecommunication system
risks (for protection) definition ...........................................................103
delay related21, 29, 33, 52, 55, 56, 57, 58, 59, 61, introduction, purpose...........................................17
171 / 172
PROTECTION USING TELECOMMUNICATIONS
CIGRE JWG 34/35.11
usage of ...............................................................19 U
teleprotection equipment / function
under reaching .........................................................34
definition ...........................................................103
teleprotection function V
introduction, purpose ..........................................17
virtual paths .............................................................91
teleprotection system
voice frequency circuit ............................................57
definition ...........................................................103
voiceband modem....................................................57
time coordination.....................................................51
voice-frequency interface ........................................94
time delay variation .................................................30
time stamping ........................................................101 W
times
operating times..................................................143 WDM
timing synchronization for simultaneous sampling Wavelength Division Multiplex ..............65, 66, 70
..........................................................................157 wide-area current differential protection .................52
transformer protection .............................................47 wide-area protection ..........................................51, 57
transmission time.....................................86, 106, 107 requirements on telecommunication .................110
definition ...........................................................104 wide-area timing synchronization............................52
maximum actual................................................104 Z
nominal .............................................................104
transport networks .............................................77, 88 zone ..... 15, 22, 35, 36, 38, 39, 42, 43, 46, 49, 51, 115
172 / 172
Le CIGRÉ a apporté le plus grand soin à la réalisation de cette brochure thématique numérique afin de vous
fournir une information complète et fiable.
Cependant, le CIGRÉ ne pourra en aucun cas être tenu responsable des préjudices ou dommages de quelque
nature que ce soit pouvant résulter d’une mauvaise utilisation des informations contenues dans cette brochure.
Copyright © 2000
Toute reproduction, même partielle, par quelque procédé que ce soit, est interdite sans autorisation préalable.
Cette interdiction ne peut s’appliquer à l’utilisateur personne physique ayant acheté ce document pour
l’impression dudit document à des fins strictement personnelles.
Pour toute utilisation collective, prière de nous contacter à sales-meetings@cigre.org
The greatest care has been taken by CIGRE to produce this digital technical brochure so as to provide you with
full and reliable information.
However, CIGRE could in any case be held responsible for any damage resulting from any misuse of the
information contained therein.
Published by CIGRE
21, rue d’Artois
FR-75 008 PARIS
Tel : +33 1 53 89 12 90
Fax : +33 1 53 89 12 99
Copyright © 2000
All rights of circulation, translation and reproduction reserved for all countries.
No part of this publication may be produced or transmitted, in any form or by any means, without prior
permission of the publisher. This measure will not apply in the case of printing off of this document by any
individual having purchased it for personal purposes.
For any collective use, please contact us at sales-meetings@cigre.org